Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe
Resource
win10v2004-20240508-en
General
-
Target
03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe
-
Size
4.8MB
-
MD5
866ddec917d4206ad0e2077b0c420681
-
SHA1
bbc26fad62ddd5a6b574eae8dac4064f7cf58746
-
SHA256
03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4
-
SHA512
7f79c62e54da1f292eb1f8bc641ba7fc3437d260ba06802055890ff76f84735d24fec39af3422276f9bf48f0aaa7ae34142f6fc6c9aaec9265675e37c5989d65
-
SSDEEP
98304:emhd1UryeyG/hQNgenKV7wQqZUha5jtSyR:elSG/S62QbaZtlR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3492 4834.tmp -
Executes dropped EXE 1 IoCs
pid Process 3492 4834.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 388 wrote to memory of 3492 388 03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe 83 PID 388 wrote to memory of 3492 388 03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe 83 PID 388 wrote to memory of 3492 388 03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe"C:\Users\Admin\AppData\Local\Temp\03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\4834.tmp"C:\Users\Admin\AppData\Local\Temp\4834.tmp" --splashC:\Users\Admin\AppData\Local\Temp\03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe 89685648296A0BC6644E173CEC83E37C47F669987EBBD3703501923C6DA95BD49132AF886186BECBE1FE6F004874D14DB544D984315DFFBD021B5DAA1932F4C02⤵
- Deletes itself
- Executes dropped EXE
PID:3492
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD55aad1b0f373720c1292fa9cdebd17be2
SHA1294dd55ae3b60e9a9099b9c4723620e3ba88bff1
SHA256fc0a7fbfaa3aadd9f77ce0dcb45c1fe14f031b12bdda99f733865a8a14a32a81
SHA5123fd2a79858c4cccf059c7c60549fdc23e091be8d496eccb0b30c3ad84d5e085c91ed4f00c79d203e7b15bdf6e69ed13d2b1a4477d1c674b83b4caef9ceb7c55b