Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2024, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe
Resource
win10v2004-20240226-en
General
-
Target
97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe
-
Size
411KB
-
MD5
33cda9b3a2d620bcef5a01024a5a872c
-
SHA1
a3335ff5a36efdfcb92e769b12563dd75869682f
-
SHA256
97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8
-
SHA512
d7e8c1adc60c77dd75fcc907362ee6672bfe3617f971d69b1709e980a4e16111bf03998c63e21c89e30249c99212b1097824b73e82125758361aae19c0b7a306
-
SSDEEP
12288:gZLolhNVyEdHfS5BPxmLYFdEJpjjslqHI:gZqhOERfyXmyEJpjjsR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3724 599.tmp -
Executes dropped EXE 1 IoCs
pid Process 3724 599.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1972 wrote to memory of 3724 1972 97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe 90 PID 1972 wrote to memory of 3724 1972 97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe 90 PID 1972 wrote to memory of 3724 1972 97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe"C:\Users\Admin\AppData\Local\Temp\97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\599.tmp"C:\Users\Admin\AppData\Local\Temp\599.tmp" --pingC:\Users\Admin\AppData\Local\Temp\97fcb86dfc634075e2d7fc5640c87093b7ac9185a6029e1f401907864bfe88e8.exe 50EBDBEEB6780587236A0DC115D704C1083269845BDAB65BFF38EE67B1DF888052597C0B52D7E978FD820EF1332A7DB0676FD0A4370DD3E8680A63486D76CC472⤵
- Deletes itself
- Executes dropped EXE
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3608 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:3540
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5fc2bb061918b642250fc977bdcd938d4
SHA118ad2a209d01a4a069d26189b69a69ee12b29307
SHA256d6c0f3070fe13eaaac7305f942491637595008567fb34bb04f2810f92f23432d
SHA5123a1b737b88675868eb295ea09d5c58064e7008668dda1bc3da001fe3a63eaa4d66f8bc98d270922c282e7433900d8cd8fd73cd1dcc665f932f53d10a61755bc2