Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 22:48
Static task
static1
Behavioral task
behavioral1
Sample
6711ad3ab00df39eb09e84ff4ef85dfaa6bb562a65f8886453130b555db26d8e.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
6711ad3ab00df39eb09e84ff4ef85dfaa6bb562a65f8886453130b555db26d8e.exe
Resource
win10v2004-20240226-en
General
-
Target
6711ad3ab00df39eb09e84ff4ef85dfaa6bb562a65f8886453130b555db26d8e.exe
-
Size
79KB
-
MD5
39b1e0ea86726d953728f6b237f747b1
-
SHA1
40064b7691f2ac9e5860276c643f5ecec6a2f3e8
-
SHA256
6711ad3ab00df39eb09e84ff4ef85dfaa6bb562a65f8886453130b555db26d8e
-
SHA512
d82e8be6c2cdeab369b1b0049abbbc4000cd102a3599588ab250c3571195f997583e4681397842c8892aed40bf90ba65e68a3d9cb347eceff62a7e2639326f62
-
SSDEEP
1536:zvI/UIvqd/7oYvzsYaKOQA8AkqUhMb2nuy5wgIP0CSJ+5ycKmB8GMGlZ5G:zvIZqdDNsYa/GdqU7uy5w9WMycKmN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3628 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2600 wrote to memory of 1380 2600 6711ad3ab00df39eb09e84ff4ef85dfaa6bb562a65f8886453130b555db26d8e.exe 86 PID 2600 wrote to memory of 1380 2600 6711ad3ab00df39eb09e84ff4ef85dfaa6bb562a65f8886453130b555db26d8e.exe 86 PID 2600 wrote to memory of 1380 2600 6711ad3ab00df39eb09e84ff4ef85dfaa6bb562a65f8886453130b555db26d8e.exe 86 PID 1380 wrote to memory of 3628 1380 cmd.exe 87 PID 1380 wrote to memory of 3628 1380 cmd.exe 87 PID 1380 wrote to memory of 3628 1380 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6711ad3ab00df39eb09e84ff4ef85dfaa6bb562a65f8886453130b555db26d8e.exe"C:\Users\Admin\AppData\Local\Temp\6711ad3ab00df39eb09e84ff4ef85dfaa6bb562a65f8886453130b555db26d8e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.exePID:1380
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3628
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD54e779093449b7fbe3f335552ed62040e
SHA18ca2fe97175ef41767db4fdc5b7aab498b3936d4
SHA256a6afa933956248dfabae097f4c8c978b10ff199d6f9094333f1101fc928a219b
SHA5129558823a29067751efb065c37af90708664a25f58c3c058fca7965aa35a56718189bfa80e4570dd5f1f5acd9aafca0814e444005241e8631a3482fe1713955f4