Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 20:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe
-
Size
981KB
-
MD5
13a80733af9c09c5733400694f1546d3
-
SHA1
970d592bb6db18513f38bddeb5c067ca33e509ad
-
SHA256
dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc
-
SHA512
03750a84030da38a7d91c1244badbb1517b363cdd21669b36ad32ae8bce8e13eae17dc685f6eeaf0d1f653b878092b152ac6db2e2098e3a1bac073bef154e718
-
SSDEEP
12288:uIbICCGgCDPQdqTsKaryQozYBiLLaSpZndB9y8RutX2tDh1DSMGmQ2mbw3hfYnFc:uIbIFGgJgTsgAgLnbuxYh1+uM1F9pq
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4616 set thread context of 4760 4616 dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe 91 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4760 4616 dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe 91 PID 4616 wrote to memory of 4760 4616 dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe 91 PID 4616 wrote to memory of 4760 4616 dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe 91 PID 4616 wrote to memory of 4760 4616 dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe 91 PID 4616 wrote to memory of 4760 4616 dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe 91 PID 4616 wrote to memory of 4760 4616 dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe 91 PID 4616 wrote to memory of 4760 4616 dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe 91 PID 4616 wrote to memory of 4760 4616 dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe 91 PID 4616 wrote to memory of 4760 4616 dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe 91 PID 4616 wrote to memory of 4760 4616 dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe"C:\Users\Admin\AppData\Local\Temp\dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe"C:\Users\Admin\AppData\Local\Temp\dbc44785db57ad737880190a86d30e5b6ffd77dd35d457f74cfb7637ffee25bc.exe"2⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3980 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵PID:2636