Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe
Resource
win11-20240426-en
General
-
Target
a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe
-
Size
12KB
-
MD5
a8c4c40b7ed30dc2ddce7439b8b269d1
-
SHA1
90c75c42fc6cda1a51f2a4333ec8f0e08c4286a5
-
SHA256
a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea
-
SHA512
56ac9f14768d3bab481ad842b3b1a2cdc3df3ec5a76527c0d4d836684fed87aebeeee529507ae73434a7bf6f31a7d08bdd1732f37f962ee1a9e1ce84a87cd339
-
SSDEEP
192:L1hrI1SyJzDl6hG/PTndpa/Wh/KzPwhKiEL6ryN1Q9WlJdxqHbo1xx:Rh+J/r/uP4WgWlJj+WT
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 1348 242607061745419.exe 4944 242607061757732.exe 4124 242607061822388.exe 4556 242607061835356.exe 1900 242607061848716.exe 4200 242607061913622.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2816 wrote to memory of 4152 2816 a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe 93 PID 2816 wrote to memory of 4152 2816 a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe 93 PID 4152 wrote to memory of 1348 4152 cmd.exe 94 PID 4152 wrote to memory of 1348 4152 cmd.exe 94 PID 1348 wrote to memory of 1180 1348 242607061745419.exe 96 PID 1348 wrote to memory of 1180 1348 242607061745419.exe 96 PID 1180 wrote to memory of 4944 1180 cmd.exe 97 PID 1180 wrote to memory of 4944 1180 cmd.exe 97 PID 4944 wrote to memory of 640 4944 242607061757732.exe 98 PID 4944 wrote to memory of 640 4944 242607061757732.exe 98 PID 640 wrote to memory of 4124 640 cmd.exe 99 PID 640 wrote to memory of 4124 640 cmd.exe 99 PID 4124 wrote to memory of 4496 4124 242607061822388.exe 100 PID 4124 wrote to memory of 4496 4124 242607061822388.exe 100 PID 4496 wrote to memory of 4556 4496 cmd.exe 101 PID 4496 wrote to memory of 4556 4496 cmd.exe 101 PID 4556 wrote to memory of 3776 4556 242607061835356.exe 102 PID 4556 wrote to memory of 3776 4556 242607061835356.exe 102 PID 3776 wrote to memory of 1900 3776 cmd.exe 103 PID 3776 wrote to memory of 1900 3776 cmd.exe 103 PID 1900 wrote to memory of 2864 1900 242607061848716.exe 104 PID 1900 wrote to memory of 2864 1900 242607061848716.exe 104 PID 2864 wrote to memory of 4200 2864 cmd.exe 105 PID 2864 wrote to memory of 4200 2864 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe"C:\Users\Admin\AppData\Local\Temp\a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061745419.exe 0000012⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\242607061745419.exeC:\Users\Admin\AppData\Local\Temp\242607061745419.exe 0000013⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061757732.exe 0000024⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\242607061757732.exeC:\Users\Admin\AppData\Local\Temp\242607061757732.exe 0000025⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061822388.exe 0000036⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\242607061822388.exeC:\Users\Admin\AppData\Local\Temp\242607061822388.exe 0000037⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061835356.exe 0000048⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\242607061835356.exeC:\Users\Admin\AppData\Local\Temp\242607061835356.exe 0000049⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061848716.exe 00000510⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\242607061848716.exeC:\Users\Admin\AppData\Local\Temp\242607061848716.exe 00000511⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061913622.exe 00000612⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\242607061913622.exeC:\Users\Admin\AppData\Local\Temp\242607061913622.exe 00000613⤵
- Executes dropped EXE
PID:4200
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD591a518dd653a2849c42e53bf3f41b786
SHA1e243b5886d44499c8aabd4b473a6bed3bf54f1fd
SHA256001fb6d700f450a1088febdbc1be46cdf645be4be65651a2d5c455fa4e5c7092
SHA512c444f5ef4f2e4ef6d4bd1e49ee093eca94ea79b538ac7b1a831ca5a867df500faf7962d51db82c42c8d2dd526a2b6cb0d438c9b17a80594a8df75b5d8ab98bc6
-
Filesize
13KB
MD5883649598cac112bf261fc69d825a990
SHA19f103ef3ca4d4fc0ca8e41b28c6c874f638eccf6
SHA2561665bb9607430a1820d31c34e13653ad1ceb42c024eb7e78c7507e57aeae2fb2
SHA512c920a0c49e607df0d93e9e88c2301eb99afd72f6fee48cd20ad02e971445be13c2e627904a25f00617d23f97d6b0f3658503300e02fdc1707cb89f055352bd50
-
Filesize
13KB
MD5cc43f3ced625e01659556aadb6d29e9e
SHA1c23ca1b8b6ed3529b60be1fb0e0d4444b9ecf5e9
SHA256706025d33b5e433939f201b2fd6b30e819a6fad2a98d638f74c13b1f9b71e825
SHA512a284bf259269b8c0021a2d547d67e02a3f1d1e59f3c802ce5bb8aa35bc8213af4357a08820d0f0cb827f3606e13b8b5ad90d7c2e82448fa25c2cc1c8ee836d81
-
Filesize
13KB
MD58398c4de1189674a7bc16d243805fc1b
SHA14b8a89575c3a2a09dbc6de8954b2ccd2193e29de
SHA2561c8979b53decb9a7aafd82ebdb403b60776b7d7e3cc3926461776955d5d3c6d8
SHA51239aa950ef5765ba82a7f54f3dc500dc4e0135b476bc74a0bb959651eb335ef4be16caa06533a24b966c94ee53119c430f4ada450bec7a874f2d2d2c2ea76404d
-
Filesize
12KB
MD516391676bf3c90194e0836a8ce5ee4c5
SHA1c0a15a83c6aeac6b6fa76c9fe2738d65b3da69de
SHA256cf9ae23be6aeb8a8065f81eae27d79578da9bc6dadd29c5b9ceeaf8d61d0340a
SHA512e9812a175ae67fd00112d97ea96c7d5f83ee7e4e925cf46c1e6f97b5012f8a31628b38050e8b61391ea4efdb52cf594706347dfef6ae433a52fc902de6ca7fc2
-
Filesize
13KB
MD5c7897af2668877fae5520ca171877b8a
SHA19cff0ea66d890b043c76e5d2bf5f926670268754
SHA2563a50901aafe1c4da87428a39b52a4009c3069d6dccd6a4a53d35a66b730463bc
SHA512032cef25e1712d785cc08b78180fca1815339020d1e0808077009f9028297a0191d58591b76a1cd2ddb04370bec5393bd2e985dc3156715502dd331142819bac