Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
e714d523a8db7665339db751a5742ecc8819799fd20946a5bd5ae190e5a0ee9c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e714d523a8db7665339db751a5742ecc8819799fd20946a5bd5ae190e5a0ee9c.exe
Resource
win10v2004-20240426-en
General
-
Target
e714d523a8db7665339db751a5742ecc8819799fd20946a5bd5ae190e5a0ee9c.exe
-
Size
13KB
-
MD5
c9cd999870167193c21619693dc3eabf
-
SHA1
8a92713aed49985198502811c88fd2f9616c9357
-
SHA256
e714d523a8db7665339db751a5742ecc8819799fd20946a5bd5ae190e5a0ee9c
-
SHA512
5ecdc76a9ee8b0742e3b255a639abeb85a3393e8bedf27a9c3e266754fb50d8b3a1e9b5ef5484b5f56fb37b2fa2a565d8f5120fcc69951b23db9281e26a0f6de
-
SSDEEP
192:g6KI16Bvet/iSpW6Z+QM/4YNtGcGsBGFNJP1GrlAp7tpEdiMGWlJdxqHbr321x:y/q/iGEfAvcUjWlJj+U
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 3528 242605030804343.exe 408 242605030816061.exe 3764 242605030827702.exe 1304 242605030843483.exe 4412 242605030857905.exe 464 242605030911639.exe 3540 242605030926233.exe 436 242605030940311.exe 4016 242605030953561.exe 1580 242605031007718.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2524 wrote to memory of 3100 2524 e714d523a8db7665339db751a5742ecc8819799fd20946a5bd5ae190e5a0ee9c.exe 92 PID 2524 wrote to memory of 3100 2524 e714d523a8db7665339db751a5742ecc8819799fd20946a5bd5ae190e5a0ee9c.exe 92 PID 3100 wrote to memory of 3528 3100 cmd.exe 93 PID 3100 wrote to memory of 3528 3100 cmd.exe 93 PID 3528 wrote to memory of 2936 3528 242605030804343.exe 94 PID 3528 wrote to memory of 2936 3528 242605030804343.exe 94 PID 2936 wrote to memory of 408 2936 cmd.exe 95 PID 2936 wrote to memory of 408 2936 cmd.exe 95 PID 408 wrote to memory of 4756 408 242605030816061.exe 97 PID 408 wrote to memory of 4756 408 242605030816061.exe 97 PID 4756 wrote to memory of 3764 4756 cmd.exe 98 PID 4756 wrote to memory of 3764 4756 cmd.exe 98 PID 3764 wrote to memory of 4700 3764 242605030827702.exe 99 PID 3764 wrote to memory of 4700 3764 242605030827702.exe 99 PID 4700 wrote to memory of 1304 4700 cmd.exe 100 PID 4700 wrote to memory of 1304 4700 cmd.exe 100 PID 1304 wrote to memory of 4912 1304 242605030843483.exe 101 PID 1304 wrote to memory of 4912 1304 242605030843483.exe 101 PID 4912 wrote to memory of 4412 4912 cmd.exe 102 PID 4912 wrote to memory of 4412 4912 cmd.exe 102 PID 4412 wrote to memory of 1808 4412 242605030857905.exe 103 PID 4412 wrote to memory of 1808 4412 242605030857905.exe 103 PID 1808 wrote to memory of 464 1808 cmd.exe 104 PID 1808 wrote to memory of 464 1808 cmd.exe 104 PID 464 wrote to memory of 5032 464 242605030911639.exe 105 PID 464 wrote to memory of 5032 464 242605030911639.exe 105 PID 5032 wrote to memory of 3540 5032 cmd.exe 106 PID 5032 wrote to memory of 3540 5032 cmd.exe 106 PID 3540 wrote to memory of 3788 3540 242605030926233.exe 107 PID 3540 wrote to memory of 3788 3540 242605030926233.exe 107 PID 3788 wrote to memory of 436 3788 cmd.exe 108 PID 3788 wrote to memory of 436 3788 cmd.exe 108 PID 436 wrote to memory of 1592 436 242605030940311.exe 109 PID 436 wrote to memory of 1592 436 242605030940311.exe 109 PID 1592 wrote to memory of 4016 1592 cmd.exe 110 PID 1592 wrote to memory of 4016 1592 cmd.exe 110 PID 4016 wrote to memory of 2040 4016 242605030953561.exe 111 PID 4016 wrote to memory of 2040 4016 242605030953561.exe 111 PID 2040 wrote to memory of 1580 2040 cmd.exe 112 PID 2040 wrote to memory of 1580 2040 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\e714d523a8db7665339db751a5742ecc8819799fd20946a5bd5ae190e5a0ee9c.exe"C:\Users\Admin\AppData\Local\Temp\e714d523a8db7665339db751a5742ecc8819799fd20946a5bd5ae190e5a0ee9c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242605030804343.exe 0000012⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\242605030804343.exeC:\Users\Admin\AppData\Local\Temp\242605030804343.exe 0000013⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242605030816061.exe 0000024⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\242605030816061.exeC:\Users\Admin\AppData\Local\Temp\242605030816061.exe 0000025⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242605030827702.exe 0000036⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\242605030827702.exeC:\Users\Admin\AppData\Local\Temp\242605030827702.exe 0000037⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242605030843483.exe 0000048⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\242605030843483.exeC:\Users\Admin\AppData\Local\Temp\242605030843483.exe 0000049⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242605030857905.exe 00000510⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\242605030857905.exeC:\Users\Admin\AppData\Local\Temp\242605030857905.exe 00000511⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242605030911639.exe 00000612⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\242605030911639.exeC:\Users\Admin\AppData\Local\Temp\242605030911639.exe 00000613⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242605030926233.exe 00000714⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\242605030926233.exeC:\Users\Admin\AppData\Local\Temp\242605030926233.exe 00000715⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242605030940311.exe 00000816⤵
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\242605030940311.exeC:\Users\Admin\AppData\Local\Temp\242605030940311.exe 00000817⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242605030953561.exe 00000918⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\242605030953561.exeC:\Users\Admin\AppData\Local\Temp\242605030953561.exe 00000919⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242605031007718.exe 00000a20⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\242605031007718.exeC:\Users\Admin\AppData\Local\Temp\242605031007718.exe 00000a21⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242605031019561.exe 00000b22⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\242605031019561.exeC:\Users\Admin\AppData\Local\Temp\242605031019561.exe 00000b23⤵PID:3240
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5de7f872b9d5a8764739fad5dda57838b
SHA15ceb433e58deef433cdffa86b67c244e5b67e6b1
SHA2562ec0b7259465ba7ebbb9c0b387bd9772faea7f196c1c0e0ea83c23def7334191
SHA512169dcaf21b73f72664b22b8358b1a9f9426d1387d18735b7ffb77804ec59e97b398d3cc6c7551db5ae147f65531a0268d7761d484288f5b3aa31866f1c8aaba9
-
Filesize
13KB
MD525db4e9a78b8f8a67fb4a5edfab0e0a9
SHA15083419f3a38b2dd067ddae1aacaea9378d865ab
SHA256e98462f7b1109ad969b4463df1816d95e934b2d37326ea0929aa601cfd1bbc37
SHA512ee954885442994192d75fa1b2e99bc16a4aca0b9239c683952683d0e3dff6de73c98db7ef919aa17060715e43864c04a36e7b651761aab83a8a769355a955d9a
-
Filesize
12KB
MD59a10512f4f0e1f896c45369c4fd77628
SHA1fb6f36502b3232007597309a4b39ea10432d0c23
SHA2569fb86292a0d489da8ff1af2712acdc18298761f79f75080da1fd9430b34cfef7
SHA512a69125e56384509a17143de47fda57e834e34cba4f049e4e1e6b9365c277f36b37580b4ae4ee17ab9d02603670cbeb8476563b0967d1f1acaafc5b469d309723
-
Filesize
13KB
MD588a9c317a7ed239d6bef9fc7fc862bfa
SHA1ea4bed4dc917385294f0a459c4a05505710b60f7
SHA2567e813d582e4ef0af96b7a8b21ae1e7f6c3a371b94b8652a0f2426706a0686dda
SHA512ae35fe140f0d7346a90cd1402b9431bb81e143cb109de866352aefa2c5cdec4d0eb88d2291aee9314bed9d86c3002cece8d80348f386c3daabf87ac06f475fa6
-
Filesize
12KB
MD53cefe5b480ecc678451d3002d3b4b609
SHA1799365b1e99c2adb481545e8f36a059253d7cd7a
SHA256561e4c969590ea302bf8a288c062bd2071d007bfebda7a4634c620e2e89a4471
SHA5128a069fae39bf5400862d801c0d83ac7bf8e4ece653a248e90cd0551bf7242903e3bce29260c16910558b33750889281be7e1dfc8a7e518c870e560ef7b36075f
-
Filesize
13KB
MD5a15c89822d7f2408082bc8964cfbb450
SHA186ce88a76c9dec9152e668e6b45bf44efb1d34c0
SHA2563896a90ab77ad22dee35ca7665a590dda354b4aa0e31fe1e65fe162556b84da2
SHA51220b344347845dd18541b2f9b384e24bb3417300cc3790b743e758567580d4a2e44e58dcbab44e8bef0439e99e0d2a88e4bc23f488ad59754bdb45495b6cf5341
-
Filesize
14KB
MD554c5d4004ce672c8b90749f330eeed0a
SHA1d882e58a76824b462f2a3536b6923b5ab8360c07
SHA2568d0772728da999573251d82aeaa498bbe30cd8e1fe02498d4e260f543c1b61bc
SHA5125e7f1489f4663b1e868f1571904d87912076b7e4338ba58702dc332daac130bcdfad5734c0eba712344f50167800b97bbcb0934e341269c3be3534f49dcae4ee
-
Filesize
13KB
MD513c49a8cdab7b9e5a97898a4db8fa3b0
SHA1c0aff22d23fedf679c81b7dd362dd495dc11618e
SHA2560caee13e1cecfb33686f111d120f90e15b4fab59b400dd1f93080cbaa624003f
SHA512b71a3be563c566e80c1e0d7dccc97b832e8814057cb724057c4b9c9114069ae3883d770c4011d14a6dec02ad361c81319c5fca38af1d504b5ae056825676fbd2
-
Filesize
12KB
MD5c254f72a0a918bce6be01557c938e243
SHA1cd8a4c819cdbe92377aea7f4b03315e757de5a3a
SHA256d4f4f07d65d5449493ad50345d15ea1eb862e317ff0e14adbf492e4a1ce5a448
SHA5120c8216bda88caec5944ec86e32438af83a36f007bfeee7eb71ea65b3410df987588258f534c2db71ab3010f58e0e79e562ade8e0b7872a9c2b795e73e07db127
-
Filesize
13KB
MD5ec3adee5f29f7c30e15a869cf66c0451
SHA19e0f88214007713fedb88ffd29e8cb8a5aebc866
SHA256b6a1089fd0db5411ef7d350c3505f4b8b9a06818ef9e8630d8025db7c6aa14fd
SHA512eb386e8e17d5a2273c6c82e28c7f3b3d0185db04bfc0d9b5b0891f0e1f57c8c8f09c5e51857351367a275b7abebb7e8e63581f377358c349786365699d8f106e
-
Filesize
12KB
MD53f0bf9988c9680ac3dd66665e4ff1fc7
SHA161b4b1abeacab150acab56749a89f6872976bcbc
SHA256a012b996ececcfcf4339448a8e6ef5079d60c4a8fc1a34eedddfd5400a9a0171
SHA5125fc7be84bf5353651a301c1b5213fa98ee5587031bbc53f441c4b2f1a61f9508e9aec0288ba6e599f26dbff02d932bce13a09bcf7ddb34fd867d0a38bdea749b