Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe
Resource
win10v2004-20240226-en
General
-
Target
7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe
-
Size
796KB
-
MD5
7b114e918bb53fffaf73330065c57b7e
-
SHA1
872fd024275393cbd41425883950c912d9700680
-
SHA256
7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f
-
SHA512
dffedadb3f01f8ad2af00e0d7a85779cbfbe46daab25d6f7006c190bbe9bbc6323ea56aed36ca3f741ffeb9983c1940e2b42885ad8b8b7160ad5500f67ab498a
-
SSDEEP
12288:TJz0eysF3ikNgyhk+YC4DqEfFX4UWRfR50kFiGcSroPX/h4j3depPu1P4Jxf+:TJz0Q32wktqgHWvGNpPXZ4j3depPuYk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4416 1B0A0F0B120F156B155F15B0B0F160A0D160D.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4816 7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe 4416 1B0A0F0B120F156B155F15B0B0F160A0D160D.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4816 wrote to memory of 4416 4816 7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe 90 PID 4816 wrote to memory of 4416 4816 7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe 90 PID 4816 wrote to memory of 4416 4816 7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe"C:\Users\Admin\AppData\Local\Temp\7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\1B0A0F0B120F156B155F15B0B0F160A0D160D.exeC:\Users\Admin\AppData\Local\Temp\1B0A0F0B120F156B155F15B0B0F160A0D160D.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:3696
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
796KB
MD5661736a08cc67f174bc96ee045c977f4
SHA1db76e80f1f52d1664ba213be7106030db7d870cf
SHA256028cf6050fff126561f6f823c450f6d453f096c2116ebd6bfb653f1085ccb632
SHA5120ad98ab20614124426699f23bb5a67d165cdff19ed2f489be86d049e2285131e74ae041346dfd9ebbb369eb7ba049dbaf5c2cb9b32cf04a5022e938facbaf3eb