Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
7825ad08c432e26c7894599b5e958eb08d3f6884523390d3f5aeff359e34acd6.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7825ad08c432e26c7894599b5e958eb08d3f6884523390d3f5aeff359e34acd6.exe
Resource
win10v2004-20240508-en
General
-
Target
7825ad08c432e26c7894599b5e958eb08d3f6884523390d3f5aeff359e34acd6.exe
-
Size
61KB
-
MD5
5ecde2a08c92c596b81625ef7e4df93f
-
SHA1
9d4588de70e519b24469026e40f94016d16f4fe6
-
SHA256
7825ad08c432e26c7894599b5e958eb08d3f6884523390d3f5aeff359e34acd6
-
SHA512
c3b60612b9f6e82be0a0976af94550a489f2919c2453325e8b9ea562031a2a5e5e0e1bf3927768107a8cefa6ed3cbc4000e93ea434013313bc6e246b1a1f1bf2
-
SSDEEP
1536:Qttdse4OcUmWQIvEPZo6E5sEFd29NQgA2wwle5:Qdse4OlQZo6EKEFdGM21le5
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 3960 ewiuer2.exe 3392 ewiuer2.exe 5092 ewiuer2.exe 800 ewiuer2.exe 1352 ewiuer2.exe 5040 ewiuer2.exe 3840 ewiuer2.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe File opened for modification C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe File created C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3884 wrote to memory of 3960 3884 7825ad08c432e26c7894599b5e958eb08d3f6884523390d3f5aeff359e34acd6.exe 82 PID 3884 wrote to memory of 3960 3884 7825ad08c432e26c7894599b5e958eb08d3f6884523390d3f5aeff359e34acd6.exe 82 PID 3884 wrote to memory of 3960 3884 7825ad08c432e26c7894599b5e958eb08d3f6884523390d3f5aeff359e34acd6.exe 82 PID 3960 wrote to memory of 3392 3960 ewiuer2.exe 98 PID 3960 wrote to memory of 3392 3960 ewiuer2.exe 98 PID 3960 wrote to memory of 3392 3960 ewiuer2.exe 98 PID 3392 wrote to memory of 5092 3392 ewiuer2.exe 99 PID 3392 wrote to memory of 5092 3392 ewiuer2.exe 99 PID 3392 wrote to memory of 5092 3392 ewiuer2.exe 99 PID 5092 wrote to memory of 800 5092 ewiuer2.exe 101 PID 5092 wrote to memory of 800 5092 ewiuer2.exe 101 PID 5092 wrote to memory of 800 5092 ewiuer2.exe 101 PID 800 wrote to memory of 1352 800 ewiuer2.exe 102 PID 800 wrote to memory of 1352 800 ewiuer2.exe 102 PID 800 wrote to memory of 1352 800 ewiuer2.exe 102 PID 1352 wrote to memory of 5040 1352 ewiuer2.exe 109 PID 1352 wrote to memory of 5040 1352 ewiuer2.exe 109 PID 1352 wrote to memory of 5040 1352 ewiuer2.exe 109 PID 5040 wrote to memory of 3840 5040 ewiuer2.exe 110 PID 5040 wrote to memory of 3840 5040 ewiuer2.exe 110 PID 5040 wrote to memory of 3840 5040 ewiuer2.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\7825ad08c432e26c7894599b5e958eb08d3f6884523390d3f5aeff359e34acd6.exe"C:\Users\Admin\AppData\Local\Temp\7825ad08c432e26c7894599b5e958eb08d3f6884523390d3f5aeff359e34acd6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\System32\ewiuer2.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\System32\ewiuer2.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\System32\ewiuer2.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe8⤵
- Executes dropped EXE
PID:3840
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5eb38f840c4e5c5a798fce0496d88cac6
SHA11d38a1a7b7a97bb6a12d2cc465256668dfed90e7
SHA2562ed6fda042d4cb0c24e3bd8d64c45eebe364527c4224a6b2c8337e64d0681473
SHA512d1a161aa2773167da98600e5a1f3abddabc41ff5d88647c4b739ff90f5c9ddf2d9a9155482e287d155c4a7c4c8097d80b505a79d2fe5b72b40a6fd2636e27c01
-
Filesize
61KB
MD53b56b02387b4ea5182f727eda98e539e
SHA13d13da36129574eff735c33fda8d1079151e0a07
SHA2569f9e58116e6efbeeed44a6755c079ce87bf80b3d239d5ab40a465c831dba7353
SHA51235dd8f6c0dac2e21acb7ed707396dad56ed7757814c084bf623c7681cfac602d8e0d4a1cf6da586b7c08622102bc94b5ed8f8cd2ac2a8344998ce2b25798aa9f
-
Filesize
61KB
MD5251f572693b8322724a9cf4168d4ef50
SHA1e2d6728a234f07e47fc65422d84598e9e876c887
SHA256d9c94c3a54b25cf5545fa9ba6d927ed21adc7f51b70fcfb0388bcc6e214778d2
SHA512a22b1303b101f5a7931850211771903d61f0d8e42109fcd70d78a6ad0e3e9ba06cf07051640b3d4287fc1edc4f930da8333f19fba6f78e16ef1bba47d8cba5e9
-
Filesize
61KB
MD536ad1cb0fcf576b577a2df7becbccdeb
SHA1aeeb555bb62a223257045c12a0f281a5ad9f64ce
SHA25663c85e0c6d68490f024c6390ee2caa6ac7e2e8fdab5a86dfa8c084f859f0444f
SHA512bb335717948612b3f5b354267c2b2c065e9a012241d5535501510fbd1b7c0ccec36f24512567fcbe6ae2749cdda3cf6e96302867958e4926b557f2acf1c6bc2f
-
Filesize
61KB
MD59e7c5e9ff18c61591eb4424889a08043
SHA191d2ea0e31c92951c0309369744e9e865488dffb
SHA256e947d1a716580b1b3a0705398dd4d9b746fda15dc30cc012476882a38d3252aa
SHA5120e5cae0028b0f33f8862cfa1834416250bf6491dbe85b1e9202f554e6e241e9be4e62101cc32ad8227e306c6b782fecf8ac8d8973be75ad7f38dc4e92886444f
-
Filesize
61KB
MD5fbdb932ecb99bd181f8bc81199de9b65
SHA104d0a7f35b58d6c664997e7fa5873fcff4f96cc5
SHA256935b27001a41c645daad511cd3a8aa44c4b95a4f36f4e0081675bfde9b5063b0
SHA5122480a5ea44bb0c7d8c694a8f7fa977504966da8467ca7d4de7039e1cc60d3d214ad58ced2d64411f9f7ff71c5033e6358f9a906e7db7500758568b3b4203bbf5
-
Filesize
61KB
MD5fe5bdc9d555129c178cd1dc64b6f61ae
SHA1c37fcb2f05c792fb6447ef3aa2a80b3d8914eca7
SHA25664f5b70c9f0f81bf7ba49d6d86bccb058546a53c9d078ebff0ed491d11e4cb55
SHA5121dcc6ca90b1a8ef0f976a060e6d5a838362cc43fc14aecc4a55913745ebe0d35d660a7a2d5a768adc7ac01ad7eff66721d41bd891091efb5498c48a605a2a35a