Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
Sony Vegas Pro 14 Patch.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Sony Vegas Pro 14 Patch.exe
Resource
win10v2004-20240508-en
General
-
Target
Sony Vegas Pro 14 Patch.exe
-
Size
13.6MB
-
MD5
3d6def6f1c49ac28995862ce72d44ec6
-
SHA1
530f387d2539020fe794544a0b76f41fd67091f9
-
SHA256
c22df08df65fdd354ac969dc91d3d3ef4a8157ebd2c8720c52bbc1fac2e54510
-
SHA512
62b2d98c8f29b00c76c975fa7e219b82976ffa16390da8b7055c6c052274b0eba1a20963ee26dc8325965ed64fdd0c0fbb2202987a91fbf2cf7e427786c34d5c
-
SSDEEP
393216:xsUR2F9uK+H052X4oc8OOoBmecNr2ZRG0G6Oxcxt5N:rvH5IZ85YZ/Gf2/D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3712 Sony Vegas Pro 14 Patch.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3712 3480 Sony Vegas Pro 14 Patch.exe 82 PID 3480 wrote to memory of 3712 3480 Sony Vegas Pro 14 Patch.exe 82 PID 3480 wrote to memory of 3712 3480 Sony Vegas Pro 14 Patch.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sony Vegas Pro 14 Patch.exe"C:\Users\Admin\AppData\Local\Temp\Sony Vegas Pro 14 Patch.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\is-2LP0B.tmp\Sony Vegas Pro 14 Patch.tmp"C:\Users\Admin\AppData\Local\Temp\is-2LP0B.tmp\Sony Vegas Pro 14 Patch.tmp" /SL5="$501EC,13790952,477184,C:\Users\Admin\AppData\Local\Temp\Sony Vegas Pro 14 Patch.exe"2⤵
- Executes dropped EXE
PID:3712
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD54e36eefd8af8607ffa74c543bca21fdb
SHA105058307797aac1e1ed52507d23dc0e172bf31b2
SHA256ac6a2fd94cf9a132ecc0253ca1e223c324bea9d7eea892cf60191fa4e8b6dc92
SHA512fb64d132c8c4fe5439caa2b0209719898d39adf21bfd2b45a0931769068ccfae44e1d88175235502243dd285702dfe17da7d27f2287d050bb8045ac6647b9b71