Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2024, 06:17

General

  • Target

    a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe

  • Size

    12KB

  • MD5

    a8c4c40b7ed30dc2ddce7439b8b269d1

  • SHA1

    90c75c42fc6cda1a51f2a4333ec8f0e08c4286a5

  • SHA256

    a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea

  • SHA512

    56ac9f14768d3bab481ad842b3b1a2cdc3df3ec5a76527c0d4d836684fed87aebeeee529507ae73434a7bf6f31a7d08bdd1732f37f962ee1a9e1ce84a87cd339

  • SSDEEP

    192:L1hrI1SyJzDl6hG/PTndpa/Wh/KzPwhKiEL6ryN1Q9WlJdxqHbo1xx:Rh+J/r/uP4WgWlJj+WT

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe
    "C:\Users\Admin\AppData\Local\Temp\a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061745419.exe 000001
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4152
      • C:\Users\Admin\AppData\Local\Temp\242607061745419.exe
        C:\Users\Admin\AppData\Local\Temp\242607061745419.exe 000001
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1348
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061757732.exe 000002
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1180
          • C:\Users\Admin\AppData\Local\Temp\242607061757732.exe
            C:\Users\Admin\AppData\Local\Temp\242607061757732.exe 000002
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4944
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061822388.exe 000003
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:640
              • C:\Users\Admin\AppData\Local\Temp\242607061822388.exe
                C:\Users\Admin\AppData\Local\Temp\242607061822388.exe 000003
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:4124
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061835356.exe 000004
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4496
                  • C:\Users\Admin\AppData\Local\Temp\242607061835356.exe
                    C:\Users\Admin\AppData\Local\Temp\242607061835356.exe 000004
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:4556
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061848716.exe 000005
                      10⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3776
                      • C:\Users\Admin\AppData\Local\Temp\242607061848716.exe
                        C:\Users\Admin\AppData\Local\Temp\242607061848716.exe 000005
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of WriteProcessMemory
                        PID:1900
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061913622.exe 000006
                          12⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2864
                          • C:\Users\Admin\AppData\Local\Temp\242607061913622.exe
                            C:\Users\Admin\AppData\Local\Temp\242607061913622.exe 000006
                            13⤵
                            • Executes dropped EXE
                            PID:4200

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\242607061745419.exe

    Filesize

    13KB

    MD5

    91a518dd653a2849c42e53bf3f41b786

    SHA1

    e243b5886d44499c8aabd4b473a6bed3bf54f1fd

    SHA256

    001fb6d700f450a1088febdbc1be46cdf645be4be65651a2d5c455fa4e5c7092

    SHA512

    c444f5ef4f2e4ef6d4bd1e49ee093eca94ea79b538ac7b1a831ca5a867df500faf7962d51db82c42c8d2dd526a2b6cb0d438c9b17a80594a8df75b5d8ab98bc6

  • C:\Users\Admin\AppData\Local\Temp\242607061757732.exe

    Filesize

    13KB

    MD5

    883649598cac112bf261fc69d825a990

    SHA1

    9f103ef3ca4d4fc0ca8e41b28c6c874f638eccf6

    SHA256

    1665bb9607430a1820d31c34e13653ad1ceb42c024eb7e78c7507e57aeae2fb2

    SHA512

    c920a0c49e607df0d93e9e88c2301eb99afd72f6fee48cd20ad02e971445be13c2e627904a25f00617d23f97d6b0f3658503300e02fdc1707cb89f055352bd50

  • C:\Users\Admin\AppData\Local\Temp\242607061822388.exe

    Filesize

    13KB

    MD5

    cc43f3ced625e01659556aadb6d29e9e

    SHA1

    c23ca1b8b6ed3529b60be1fb0e0d4444b9ecf5e9

    SHA256

    706025d33b5e433939f201b2fd6b30e819a6fad2a98d638f74c13b1f9b71e825

    SHA512

    a284bf259269b8c0021a2d547d67e02a3f1d1e59f3c802ce5bb8aa35bc8213af4357a08820d0f0cb827f3606e13b8b5ad90d7c2e82448fa25c2cc1c8ee836d81

  • C:\Users\Admin\AppData\Local\Temp\242607061835356.exe

    Filesize

    13KB

    MD5

    8398c4de1189674a7bc16d243805fc1b

    SHA1

    4b8a89575c3a2a09dbc6de8954b2ccd2193e29de

    SHA256

    1c8979b53decb9a7aafd82ebdb403b60776b7d7e3cc3926461776955d5d3c6d8

    SHA512

    39aa950ef5765ba82a7f54f3dc500dc4e0135b476bc74a0bb959651eb335ef4be16caa06533a24b966c94ee53119c430f4ada450bec7a874f2d2d2c2ea76404d

  • C:\Users\Admin\AppData\Local\Temp\242607061848716.exe

    Filesize

    12KB

    MD5

    16391676bf3c90194e0836a8ce5ee4c5

    SHA1

    c0a15a83c6aeac6b6fa76c9fe2738d65b3da69de

    SHA256

    cf9ae23be6aeb8a8065f81eae27d79578da9bc6dadd29c5b9ceeaf8d61d0340a

    SHA512

    e9812a175ae67fd00112d97ea96c7d5f83ee7e4e925cf46c1e6f97b5012f8a31628b38050e8b61391ea4efdb52cf594706347dfef6ae433a52fc902de6ca7fc2

  • C:\Users\Admin\AppData\Local\Temp\242607061913622.exe

    Filesize

    13KB

    MD5

    c7897af2668877fae5520ca171877b8a

    SHA1

    9cff0ea66d890b043c76e5d2bf5f926670268754

    SHA256

    3a50901aafe1c4da87428a39b52a4009c3069d6dccd6a4a53d35a66b730463bc

    SHA512

    032cef25e1712d785cc08b78180fca1815339020d1e0808077009f9028297a0191d58591b76a1cd2ddb04370bec5393bd2e985dc3156715502dd331142819bac