Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Dh-A.21284.25347.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.Dh-A.21284.25347.exe
Resource
win10v2004-20240426-en
General
-
Target
SecuriteInfo.com.Win32.Dh-A.21284.25347.exe
-
Size
12KB
-
MD5
b42757d57c78e0f21cc00afc228af7be
-
SHA1
af8052d55b666a80cf0c4ef426233bd9e1116180
-
SHA256
97d40af833e3b836bc8d0d5de03f3f7a6fd36a01d77fe3cd0b342aba0a68eb84
-
SHA512
97f3c5a83341d29e431964a0137fed8a8fbc5ea38b9b2f86ddb69355b1af086c384de61c4ae04c232ff45051dc075a7f9fecb0aea400054e618cab211f4c0f5e
-
SSDEEP
192:MdMT5aIVSlvlib6oEwCc+0U6osy7Aihpvi1U4t+mNj4WlJdxqHiYrJ:9hKUrlj03erNj4WlJj+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
pid Process 4024 240603051912430.exe 2764 242603051925399.exe 1228 242603051937086.exe 2460 242603051947946.exe 3384 242603051958461.exe 4856 242603052010102.exe 1508 242603052020977.exe 4524 242603052032696.exe 3236 242603052043524.exe 4348 242603052053789.exe 4924 242603052103758.exe 4896 242603052114180.exe 3804 242603052125305.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 600 wrote to memory of 540 600 SecuriteInfo.com.Win32.Dh-A.21284.25347.exe 93 PID 600 wrote to memory of 540 600 SecuriteInfo.com.Win32.Dh-A.21284.25347.exe 93 PID 540 wrote to memory of 4024 540 cmd.exe 94 PID 540 wrote to memory of 4024 540 cmd.exe 94 PID 4024 wrote to memory of 4440 4024 240603051912430.exe 95 PID 4024 wrote to memory of 4440 4024 240603051912430.exe 95 PID 4440 wrote to memory of 2764 4440 cmd.exe 96 PID 4440 wrote to memory of 2764 4440 cmd.exe 96 PID 2764 wrote to memory of 3528 2764 242603051925399.exe 98 PID 2764 wrote to memory of 3528 2764 242603051925399.exe 98 PID 3528 wrote to memory of 1228 3528 cmd.exe 99 PID 3528 wrote to memory of 1228 3528 cmd.exe 99 PID 1228 wrote to memory of 552 1228 242603051937086.exe 100 PID 1228 wrote to memory of 552 1228 242603051937086.exe 100 PID 552 wrote to memory of 2460 552 cmd.exe 101 PID 552 wrote to memory of 2460 552 cmd.exe 101 PID 2460 wrote to memory of 564 2460 242603051947946.exe 102 PID 2460 wrote to memory of 564 2460 242603051947946.exe 102 PID 564 wrote to memory of 3384 564 cmd.exe 103 PID 564 wrote to memory of 3384 564 cmd.exe 103 PID 3384 wrote to memory of 4072 3384 242603051958461.exe 104 PID 3384 wrote to memory of 4072 3384 242603051958461.exe 104 PID 4072 wrote to memory of 4856 4072 cmd.exe 105 PID 4072 wrote to memory of 4856 4072 cmd.exe 105 PID 4856 wrote to memory of 1688 4856 242603052010102.exe 106 PID 4856 wrote to memory of 1688 4856 242603052010102.exe 106 PID 1688 wrote to memory of 1508 1688 cmd.exe 107 PID 1688 wrote to memory of 1508 1688 cmd.exe 107 PID 1508 wrote to memory of 4172 1508 242603052020977.exe 108 PID 1508 wrote to memory of 4172 1508 242603052020977.exe 108 PID 4172 wrote to memory of 4524 4172 cmd.exe 109 PID 4172 wrote to memory of 4524 4172 cmd.exe 109 PID 4524 wrote to memory of 1068 4524 242603052032696.exe 110 PID 4524 wrote to memory of 1068 4524 242603052032696.exe 110 PID 1068 wrote to memory of 3236 1068 cmd.exe 111 PID 1068 wrote to memory of 3236 1068 cmd.exe 111 PID 3236 wrote to memory of 4860 3236 242603052043524.exe 112 PID 3236 wrote to memory of 4860 3236 242603052043524.exe 112 PID 4860 wrote to memory of 4348 4860 cmd.exe 113 PID 4860 wrote to memory of 4348 4860 cmd.exe 113 PID 4348 wrote to memory of 2196 4348 242603052053789.exe 114 PID 4348 wrote to memory of 2196 4348 242603052053789.exe 114 PID 2196 wrote to memory of 4924 2196 cmd.exe 115 PID 2196 wrote to memory of 4924 2196 cmd.exe 115 PID 4924 wrote to memory of 860 4924 242603052103758.exe 116 PID 4924 wrote to memory of 860 4924 242603052103758.exe 116 PID 860 wrote to memory of 4896 860 cmd.exe 117 PID 860 wrote to memory of 4896 860 cmd.exe 117 PID 4896 wrote to memory of 3828 4896 242603052114180.exe 118 PID 4896 wrote to memory of 3828 4896 242603052114180.exe 118 PID 3828 wrote to memory of 3804 3828 cmd.exe 119 PID 3828 wrote to memory of 3804 3828 cmd.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Dh-A.21284.25347.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Dh-A.21284.25347.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\240603051912430.exe 0000012⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\240603051912430.exeC:\Users\Admin\AppData\Local\Temp\240603051912430.exe 0000013⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603051925399.exe 0000024⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\242603051925399.exeC:\Users\Admin\AppData\Local\Temp\242603051925399.exe 0000025⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603051937086.exe 0000036⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\242603051937086.exeC:\Users\Admin\AppData\Local\Temp\242603051937086.exe 0000037⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603051947946.exe 0000048⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\242603051947946.exeC:\Users\Admin\AppData\Local\Temp\242603051947946.exe 0000049⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603051958461.exe 00000510⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\242603051958461.exeC:\Users\Admin\AppData\Local\Temp\242603051958461.exe 00000511⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603052010102.exe 00000612⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\242603052010102.exeC:\Users\Admin\AppData\Local\Temp\242603052010102.exe 00000613⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603052020977.exe 00000714⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\242603052020977.exeC:\Users\Admin\AppData\Local\Temp\242603052020977.exe 00000715⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603052032696.exe 00000816⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\242603052032696.exeC:\Users\Admin\AppData\Local\Temp\242603052032696.exe 00000817⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603052043524.exe 00000918⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\242603052043524.exeC:\Users\Admin\AppData\Local\Temp\242603052043524.exe 00000919⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603052053789.exe 00000a20⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\242603052053789.exeC:\Users\Admin\AppData\Local\Temp\242603052053789.exe 00000a21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603052103758.exe 00000b22⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\242603052103758.exeC:\Users\Admin\AppData\Local\Temp\242603052103758.exe 00000b23⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603052114180.exe 00000c24⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\242603052114180.exeC:\Users\Admin\AppData\Local\Temp\242603052114180.exe 00000c25⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242603052125305.exe 00000d26⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\242603052125305.exeC:\Users\Admin\AppData\Local\Temp\242603052125305.exe 00000d27⤵
- Executes dropped EXE
PID:3804
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD55f84aba6b916ca45ab75abe4c61756dd
SHA147b59411200d1145658d3bb13b327cd11c5f62d4
SHA256309c9aa9dcfe81c03e60ca69cff938086b6daef055f268072d10327477ad5fb7
SHA5123d9497dcee27c5c5c07abe41791cdf22bab274d3e36c2abfb0da8d5d7c15e774faa64d692959f3f0c91da05f132169b6e1bc9e6882a2b3d73e294c2bdf145e85
-
Filesize
12KB
MD506c5309b27f70d69f0722e40a3bedb86
SHA13ed31979c978df90cc97d6f06b53659c414d15f2
SHA25649e64eac104bbb1bd9693ea1010549befed99c60221fa732fa493a6f2a169e57
SHA512b96515899652c2dcc6e7919bf817456ca04c2f5a843417c982ea600ded17ef910553487338910e4ed72bc8446d05a4150a019064e0b76dafc7a383cb05d514ab
-
Filesize
13KB
MD54b574ac1f94c27aed7720ed00a0e8e4f
SHA1c97a8aa14a5bede180ff93c6c8738b583111609b
SHA256668d1020bb5e6a7e455f73a1b37f0e1f02c0998dc7f5663b602a3c6899cf5bb1
SHA51264ee1607aa744c8223fb685d03a74d0f6020f52af832df501e652efe9760877a112d0e7a16b6abb03e42b7b142a5cd4339f72383366ec3f5b7a1d44f7ce4efc6
-
Filesize
13KB
MD5ef2b4629d2aab36c014b9d2ceeb5a5e3
SHA113947d2175643135ee5240df2425b58b0224edc6
SHA256dad462ba4b1d7c389c6e521d0c6da53ed7c54e533e4fa5b997723d6fb6198d3e
SHA512914d0d8e956084aab214bc8814a0c673d3e7a22321f3211c10cfafa6ab225991f139bbc142785e9c338c453fa2ba380249a3272876274a73db0db99c21a8e8a7
-
Filesize
13KB
MD57847cff83fdce72513f3be22640b1848
SHA1ea948e548e3c6017865a13456511848f2aa63deb
SHA25635ff2da77bcc1f1f1c44e494ec3e4baf106eda5f507c10c294f8c87d3146200c
SHA512ea33d2602d25d95693727d8690f0b7b84bd0f1cdf26dcd26d73a2e943efa2f4f6a1dfe1ddd6e8e80e17d176cc5747e5c437e0cedbd25cf23c90d6112cae5a416
-
Filesize
13KB
MD5cccb11f4e7118852661680c69a95ccc1
SHA186eda47af4f18ba9325989b0e40ddd6d9e985f11
SHA25632f11352c8802de3ab9b0edbd9786d1f41876a47f7ec86622f4e203078ca7198
SHA5128a038ed456d351bdf95bedaa6884904ac9ffe80fc40cf6cedf3a14409cdc394910bb1f3fb7eb35bb8a8a8aac66ad4795e6b49a5a7c18c111a4502741e1d9a5f3
-
Filesize
12KB
MD5aca0c94d924e906663e4465e81076017
SHA114fcd2d07b003a9d34f9977d5279d219d8414f5f
SHA2562db692bb5c57c6d939f536a28d809686117dba957dc7d500eda7200fbfed1099
SHA51249d86eb87aa7ceea581b6a2aa03dca280fafe586aa0932aa77f19fabe81d68cea1b4b4352804a07b92cdda6eb3fe6a2ed1a5d910ba27a77e761a2ed9a34b7925
-
Filesize
12KB
MD5860843f008851896664f74d1d03197a5
SHA132f14165260863b4d3a328545d64ca7461df768e
SHA2567b4598f270ee2049054d00d22eb7683b8dabef2690658a2499bca7e98652ae43
SHA5126e3e5a9c265082ae97787bdb80b7a69dbaced98d9bfda664ffb141d4a77b21b3f7bb44b2c97c718504da88e0d540eb8d0fe7916b6d12eff7cd1ac74a18fe1dcd
-
Filesize
12KB
MD5c998f73cc8c7752e32d05c791b2412db
SHA141739ffb17dbce80529b116311b0b2ce8d5ad8e6
SHA2566225e3fe85293f6b7d00529859493506f416c2891bc55cc2fb86aaee19d15d23
SHA5128a741405cba610f86468d229bae4259e13ee048db8a29e2bf1fd27151b0a4046793357aaaf4440f591e407b2a8d097b7acef8a73e8ba2e4defc027d0f8e2159d
-
Filesize
13KB
MD5e393083ca862f8c7feaaf930ea54f943
SHA12ac05136ee09f69d3a9647213a13077a5313de02
SHA2566bf80c3a8609b1e640e45a27046856f782d916f5839eb80208ef5ab791ac219c
SHA512641d25b63310554042a9098b7f0934c605b45bfad1772aff2fa88f84bff18c3b153547b53121b8217a3dc42260cf29b33f7bda6ae44738243b34f8e321b981e9
-
Filesize
13KB
MD5e71aba95b3c32e24199270356e44ba41
SHA15a74b0eee95b4e2846bed18f0e28c775b1f51ba2
SHA2562e898215100b099292aadbc6c51813e26d16b13e5468b29c574a6a6d5c47ff8c
SHA512c9abad17206850ff0aa781d1dc7d895e1f4850179605c81d743689837e9560368a2228bc18d6c25f1a0765c84ddbef0976a6e2870be33f2cd213164427da6255
-
Filesize
13KB
MD5e23b4fc6cffeffca043b09d3d7faaa84
SHA12848aee49b7e931b60e6b07ecab63deca6a839e7
SHA2563d00a57e29fcbc9ab4538e5289a35e60e86eba5b5d830575c77924ece0448324
SHA512b7e870f061adae41eadccedb81aee5209a3c0990f1c7988fbe581099172d5c1a09c1f81f21c5562e64677cbfc12384d09bc5a9d891099e9d59bd8cea4537d898
-
Filesize
12KB
MD5e8bcd089d51779c11696f6e12d61a7f9
SHA1690b7098da9a4a537536442c719c02b6f186d139
SHA25631403802245faf0cb3bb6f1eb067b25d3c11edae032fd7c0933fb8ddc2b7c950
SHA512b85c486543ad933ee2ed0c5dd5bcd16eba54df4d1e64248b44d0cc854117632aa45372c2d65976b0237cf4b0bc2343ba6dd3f408d920f1a9953f0f50b7a099b2