Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
190ef39de605ecf47f0386bd29c831318d306704157a629d17a4f5a584b80a0d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
190ef39de605ecf47f0386bd29c831318d306704157a629d17a4f5a584b80a0d.exe
Resource
win10v2004-20240426-en
General
-
Target
190ef39de605ecf47f0386bd29c831318d306704157a629d17a4f5a584b80a0d.exe
-
Size
5.4MB
-
MD5
c7101493d21b2c1766e8568fbde848cd
-
SHA1
05074d80430d3685ec63578d2147fdef855042f5
-
SHA256
190ef39de605ecf47f0386bd29c831318d306704157a629d17a4f5a584b80a0d
-
SHA512
616062398170106465caee5f1183c50eac93f03d3f62fb1cb293d9e6766e1d62044980c6e9cef7803457fdea2c5117da91e4c4380777c90ef4f9943acecf007a
-
SSDEEP
98304:emhd1Uryek9irB7V7wQqZUha5jtSyZIUh:elE92B72QbaZtliU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2512 42A6.tmp -
Executes dropped EXE 1 IoCs
pid Process 2512 42A6.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3564 wrote to memory of 2512 3564 190ef39de605ecf47f0386bd29c831318d306704157a629d17a4f5a584b80a0d.exe 87 PID 3564 wrote to memory of 2512 3564 190ef39de605ecf47f0386bd29c831318d306704157a629d17a4f5a584b80a0d.exe 87 PID 3564 wrote to memory of 2512 3564 190ef39de605ecf47f0386bd29c831318d306704157a629d17a4f5a584b80a0d.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\190ef39de605ecf47f0386bd29c831318d306704157a629d17a4f5a584b80a0d.exe"C:\Users\Admin\AppData\Local\Temp\190ef39de605ecf47f0386bd29c831318d306704157a629d17a4f5a584b80a0d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\42A6.tmp"C:\Users\Admin\AppData\Local\Temp\42A6.tmp" --splashC:\Users\Admin\AppData\Local\Temp\190ef39de605ecf47f0386bd29c831318d306704157a629d17a4f5a584b80a0d.exe 3ABA61D8975AE1989EEF9AF115B9663E696AE75E383E1722580C29E8D130587FD2589630F71B1A3237FC0AACFD4DFB3AA68F821E968F510A533105C74F6C11C22⤵
- Deletes itself
- Executes dropped EXE
PID:2512
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD567d10317bf5fc9258cb8fe8e880271af
SHA16daff00a4fb0ef0a70adf173a54f14a838b99af0
SHA2565581981bfcd8acc30ad025ba08db0ccbf63d7d443868a9717ed43eb8f6b12d73
SHA512419625953f770a5377b71419bc7927963d2903c61e7d904679eea932b4d9f2e5313c9d3c985df22c65dbfd1a3e913fa3d9d6d2a997c9a469fcd54745f0100692