Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
ccd0ad186f0c1d22b5a67ad1ea16e9fee7930c0844d0ae730236c70205a241d1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ccd0ad186f0c1d22b5a67ad1ea16e9fee7930c0844d0ae730236c70205a241d1.exe
Resource
win10v2004-20240412-en
General
-
Target
ccd0ad186f0c1d22b5a67ad1ea16e9fee7930c0844d0ae730236c70205a241d1.exe
-
Size
79KB
-
MD5
cb2bd881ec31b6201276a0002431c31e
-
SHA1
d5a3a8510d579d8a2ee37583ec95448f720f35ca
-
SHA256
ccd0ad186f0c1d22b5a67ad1ea16e9fee7930c0844d0ae730236c70205a241d1
-
SHA512
6eb2fda13f79e41ecdd7382805b6fec0b4532887bd426aa768ad0999efaf31ba46a70e9058063b43ea69a6317a6bf3d987a2c4f553c23d32149d5405245a1420
-
SSDEEP
1536:zvr6eee2vqONy31OQA8AkqUhMb2nuy5wgIP0CSJ+5yyB8GMGlZ5G:zvuq/sGdqU7uy5w9WMyyN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3136 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3044 wrote to memory of 908 3044 ccd0ad186f0c1d22b5a67ad1ea16e9fee7930c0844d0ae730236c70205a241d1.exe 84 PID 3044 wrote to memory of 908 3044 ccd0ad186f0c1d22b5a67ad1ea16e9fee7930c0844d0ae730236c70205a241d1.exe 84 PID 3044 wrote to memory of 908 3044 ccd0ad186f0c1d22b5a67ad1ea16e9fee7930c0844d0ae730236c70205a241d1.exe 84 PID 908 wrote to memory of 3136 908 cmd.exe 85 PID 908 wrote to memory of 3136 908 cmd.exe 85 PID 908 wrote to memory of 3136 908 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccd0ad186f0c1d22b5a67ad1ea16e9fee7930c0844d0ae730236c70205a241d1.exe"C:\Users\Admin\AppData\Local\Temp\ccd0ad186f0c1d22b5a67ad1ea16e9fee7930c0844d0ae730236c70205a241d1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\cmd.exePID:908
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3136
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD57a71825b9bbd2dbba59f7b3377cdba1a
SHA171b3249b785f14180145e5f19be0ebdb648680f6
SHA2566ebcf87f1ad0635d44ec2a90f895a43f50e94f512b351339ac32cf8146702d61
SHA512f615fd729cfc1c0befb54944134df6620965702cabe0b746a732243cd4c523b3e1c4acab478ced9571ef7ebe228c975a28bf3cd5c0dfd2e9343ff3b6632f88ae