Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 03:49

General

  • Target

    cc500c6ffbb3129b7ac2236250e0ed0fead3af8d93956c5b280ca6b9e7d52996.exe

  • Size

    97KB

  • MD5

    76a669618d75f23e7b039f6cb40e227e

  • SHA1

    da3bc8af8a5b0ffb420c922c4e0bcc5779924a64

  • SHA256

    cc500c6ffbb3129b7ac2236250e0ed0fead3af8d93956c5b280ca6b9e7d52996

  • SHA512

    7263a4363917807004177f9dc8b810aef64127b122d6b18d0840460f367697c6cc68535a6205643846be09768304362662d22ee7ba066ef7dc08b24ba3603128

  • SSDEEP

    1536:iF0AJzLopHG9aa+9qX3apJoAKWYr0vcioyjp2RXKTzRZICrWaGZh7N:iiApLN9aa+9U2EWyipjp2R6JJrWNZX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc500c6ffbb3129b7ac2236250e0ed0fead3af8d93956c5b280ca6b9e7d52996.exe
    "C:\Users\Admin\AppData\Local\Temp\cc500c6ffbb3129b7ac2236250e0ed0fead3af8d93956c5b280ca6b9e7d52996.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4944
    • C:\ProgramData\Update\WwanSvc.exe
      "C:\ProgramData\Update\WwanSvc.exe" /run
      2⤵
      • Executes dropped EXE
      PID:3200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Update\WwanSvc.exe

    Filesize

    97KB

    MD5

    6fc787243a523f728da7d7ba36fe95aa

    SHA1

    675bdad4755a5c6009affba8a0b3dd57c59b07fe

    SHA256

    24c0d74d1df47abb655af03e54ac4f2e4500aecd05f58a044dcbd146c74beb50

    SHA512

    0607e2d14df2ea11c614f877519c54bb2c745edd606ce8690374246f2defa2197ec11311dcf82858179fd2aece75797d8e29d63d71e7dfa95a6f41d8b6027d09

  • memory/3200-6-0x0000000000320000-0x000000000033E000-memory.dmp

    Filesize

    120KB

  • memory/4944-0-0x00000000009A0000-0x00000000009BE000-memory.dmp

    Filesize

    120KB

  • memory/4944-4-0x00000000009A0000-0x00000000009BE000-memory.dmp

    Filesize

    120KB