Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 23:47

General

  • Target

    7825ad08c432e26c7894599b5e958eb08d3f6884523390d3f5aeff359e34acd6.exe

  • Size

    61KB

  • MD5

    5ecde2a08c92c596b81625ef7e4df93f

  • SHA1

    9d4588de70e519b24469026e40f94016d16f4fe6

  • SHA256

    7825ad08c432e26c7894599b5e958eb08d3f6884523390d3f5aeff359e34acd6

  • SHA512

    c3b60612b9f6e82be0a0976af94550a489f2919c2453325e8b9ea562031a2a5e5e0e1bf3927768107a8cefa6ed3cbc4000e93ea434013313bc6e246b1a1f1bf2

  • SSDEEP

    1536:Qttdse4OcUmWQIvEPZo6E5sEFd29NQgA2wwle5:Qdse4OlQZo6EKEFdGM21le5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7825ad08c432e26c7894599b5e958eb08d3f6884523390d3f5aeff359e34acd6.exe
    "C:\Users\Admin\AppData\Local\Temp\7825ad08c432e26c7894599b5e958eb08d3f6884523390d3f5aeff359e34acd6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3884
    • C:\Users\Admin\AppData\Roaming\ewiuer2.exe
      C:\Users\Admin\AppData\Roaming\ewiuer2.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3960
      • C:\Windows\SysWOW64\ewiuer2.exe
        C:\Windows\System32\ewiuer2.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3392
        • C:\Users\Admin\AppData\Roaming\ewiuer2.exe
          C:\Users\Admin\AppData\Roaming\ewiuer2.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:5092
          • C:\Windows\SysWOW64\ewiuer2.exe
            C:\Windows\System32\ewiuer2.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:800
            • C:\Users\Admin\AppData\Roaming\ewiuer2.exe
              C:\Users\Admin\AppData\Roaming\ewiuer2.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:1352
              • C:\Windows\SysWOW64\ewiuer2.exe
                C:\Windows\System32\ewiuer2.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:5040
                • C:\Users\Admin\AppData\Roaming\ewiuer2.exe
                  C:\Users\Admin\AppData\Roaming\ewiuer2.exe
                  8⤵
                  • Executes dropped EXE
                  PID:3840

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\ewiuer2.exe

    Filesize

    61KB

    MD5

    eb38f840c4e5c5a798fce0496d88cac6

    SHA1

    1d38a1a7b7a97bb6a12d2cc465256668dfed90e7

    SHA256

    2ed6fda042d4cb0c24e3bd8d64c45eebe364527c4224a6b2c8337e64d0681473

    SHA512

    d1a161aa2773167da98600e5a1f3abddabc41ff5d88647c4b739ff90f5c9ddf2d9a9155482e287d155c4a7c4c8097d80b505a79d2fe5b72b40a6fd2636e27c01

  • C:\Users\Admin\AppData\Roaming\ewiuer2.exe

    Filesize

    61KB

    MD5

    3b56b02387b4ea5182f727eda98e539e

    SHA1

    3d13da36129574eff735c33fda8d1079151e0a07

    SHA256

    9f9e58116e6efbeeed44a6755c079ce87bf80b3d239d5ab40a465c831dba7353

    SHA512

    35dd8f6c0dac2e21acb7ed707396dad56ed7757814c084bf623c7681cfac602d8e0d4a1cf6da586b7c08622102bc94b5ed8f8cd2ac2a8344998ce2b25798aa9f

  • C:\Users\Admin\AppData\Roaming\ewiuer2.exe

    Filesize

    61KB

    MD5

    251f572693b8322724a9cf4168d4ef50

    SHA1

    e2d6728a234f07e47fc65422d84598e9e876c887

    SHA256

    d9c94c3a54b25cf5545fa9ba6d927ed21adc7f51b70fcfb0388bcc6e214778d2

    SHA512

    a22b1303b101f5a7931850211771903d61f0d8e42109fcd70d78a6ad0e3e9ba06cf07051640b3d4287fc1edc4f930da8333f19fba6f78e16ef1bba47d8cba5e9

  • C:\Users\Admin\AppData\Roaming\ewiuer2.exe

    Filesize

    61KB

    MD5

    36ad1cb0fcf576b577a2df7becbccdeb

    SHA1

    aeeb555bb62a223257045c12a0f281a5ad9f64ce

    SHA256

    63c85e0c6d68490f024c6390ee2caa6ac7e2e8fdab5a86dfa8c084f859f0444f

    SHA512

    bb335717948612b3f5b354267c2b2c065e9a012241d5535501510fbd1b7c0ccec36f24512567fcbe6ae2749cdda3cf6e96302867958e4926b557f2acf1c6bc2f

  • C:\Windows\SysWOW64\ewiuer2.exe

    Filesize

    61KB

    MD5

    9e7c5e9ff18c61591eb4424889a08043

    SHA1

    91d2ea0e31c92951c0309369744e9e865488dffb

    SHA256

    e947d1a716580b1b3a0705398dd4d9b746fda15dc30cc012476882a38d3252aa

    SHA512

    0e5cae0028b0f33f8862cfa1834416250bf6491dbe85b1e9202f554e6e241e9be4e62101cc32ad8227e306c6b782fecf8ac8d8973be75ad7f38dc4e92886444f

  • C:\Windows\SysWOW64\ewiuer2.exe

    Filesize

    61KB

    MD5

    fbdb932ecb99bd181f8bc81199de9b65

    SHA1

    04d0a7f35b58d6c664997e7fa5873fcff4f96cc5

    SHA256

    935b27001a41c645daad511cd3a8aa44c4b95a4f36f4e0081675bfde9b5063b0

    SHA512

    2480a5ea44bb0c7d8c694a8f7fa977504966da8467ca7d4de7039e1cc60d3d214ad58ced2d64411f9f7ff71c5033e6358f9a906e7db7500758568b3b4203bbf5

  • C:\Windows\SysWOW64\ewiuer2.exe

    Filesize

    61KB

    MD5

    fe5bdc9d555129c178cd1dc64b6f61ae

    SHA1

    c37fcb2f05c792fb6447ef3aa2a80b3d8914eca7

    SHA256

    64f5b70c9f0f81bf7ba49d6d86bccb058546a53c9d078ebff0ed491d11e4cb55

    SHA512

    1dcc6ca90b1a8ef0f976a060e6d5a838362cc43fc14aecc4a55913745ebe0d35d660a7a2d5a768adc7ac01ad7eff66721d41bd891091efb5498c48a605a2a35a