Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    07/06/2024, 06:17

General

  • Target

    a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe

  • Size

    12KB

  • MD5

    a8c4c40b7ed30dc2ddce7439b8b269d1

  • SHA1

    90c75c42fc6cda1a51f2a4333ec8f0e08c4286a5

  • SHA256

    a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea

  • SHA512

    56ac9f14768d3bab481ad842b3b1a2cdc3df3ec5a76527c0d4d836684fed87aebeeee529507ae73434a7bf6f31a7d08bdd1732f37f962ee1a9e1ce84a87cd339

  • SSDEEP

    192:L1hrI1SyJzDl6hG/PTndpa/Wh/KzPwhKiEL6ryN1Q9WlJdxqHbo1xx:Rh+J/r/uP4WgWlJj+WT

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe
    "C:\Users\Admin\AppData\Local\Temp\a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061745260.exe 000001
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3180
      • C:\Users\Admin\AppData\Local\Temp\242607061745260.exe
        C:\Users\Admin\AppData\Local\Temp\242607061745260.exe 000001
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2856
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061757167.exe 000002
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:972
          • C:\Users\Admin\AppData\Local\Temp\242607061757167.exe
            C:\Users\Admin\AppData\Local\Temp\242607061757167.exe 000002
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2448
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061833370.exe 000003
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4208
              • C:\Users\Admin\AppData\Local\Temp\242607061833370.exe
                C:\Users\Admin\AppData\Local\Temp\242607061833370.exe 000003
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2620
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061918260.exe 000004
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:568
                  • C:\Users\Admin\AppData\Local\Temp\242607061918260.exe
                    C:\Users\Admin\AppData\Local\Temp\242607061918260.exe 000004
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:1092
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061935917.exe 000005
                      10⤵
                      • Suspicious use of WriteProcessMemory
                      PID:828
                      • C:\Users\Admin\AppData\Local\Temp\242607061935917.exe
                        C:\Users\Admin\AppData\Local\Temp\242607061935917.exe 000005
                        11⤵
                        • Executes dropped EXE
                        PID:644

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\242607061745260.exe

    Filesize

    13KB

    MD5

    53b9e35fd4e8ccc856632aabf8d6b94f

    SHA1

    c5119a6381166eae05d3a18b0fa9eaf122801f82

    SHA256

    4b11c88005f0156b38922c68fa3988906703f55019823c76f4fff63b7a078d9b

    SHA512

    c7aa0fd2f507941c14116fdb6d9c520be6f3b957db835e58876d28632084b41bbcdd78ed0d570c2e1fabad7a8d3d4ca541dc553c7b2000f841464330624e6ca0

  • C:\Users\Admin\AppData\Local\Temp\242607061757167.exe

    Filesize

    13KB

    MD5

    80670d4ebdee8149fadf885c8fa8c34f

    SHA1

    5e54fe44cba282383d120b609bc0cb211de5ad8d

    SHA256

    2609c8c078261a6901c3f4144b6c00c4e61e3fcb5944b4b7c0f1bb86a01cc1c3

    SHA512

    4f611c9ba6b44b0ea3ec7362c260561b7b9d818945e1b065a6242a3fab80bb41dde0eb59ffb01e443d117f9230fda7007d9ff84a3329ada63e77c454b778873a

  • C:\Users\Admin\AppData\Local\Temp\242607061833370.exe

    Filesize

    13KB

    MD5

    068b50da1384d802e30d2d3160668327

    SHA1

    22a5466b1d71fa39471feda11ae3f641bc7e40d0

    SHA256

    aa21d6f1727412e5fb94ef22a8acfbeb0cce5388e4375be86ea09c4bcf8db05d

    SHA512

    2f7883d5f36830fb0882ee180969b9456054a784c5347801d04fe253d0f49e07177f5bbe5441decc78659e56c4c038d9d8b5f6a76f3840b83d248505a8877f7e

  • C:\Users\Admin\AppData\Local\Temp\242607061918260.exe

    Filesize

    13KB

    MD5

    afdadde0c60ee545eeed275cbd803bf0

    SHA1

    5e0997064a12a0875919fb16414924a58a565df9

    SHA256

    5276ceffe1a3db68a47b3a9d4e0f904de04a30bba51c17a2ff78abbdb671566e

    SHA512

    7ad7e128d5b2a1f82ee3c8b0966e60c598eedcc8dfe55ba8df73df9af291e43c06ad24ef9e4200b6db7057790e2e8c2bb2dfdb9683b2f03a177dad5b5acfe185

  • C:\Users\Admin\AppData\Local\Temp\242607061935917.exe

    Filesize

    13KB

    MD5

    fb6f1f89e76ba2195f9d4861d8c8298c

    SHA1

    00336ad84e1a95de4b6e9e20869f291f05c765d5

    SHA256

    366cc808bc98f67d46a794fef90d2c7ad348670137dbbfb417e3b28039e2f1aa

    SHA512

    134379a0c88fb75188540c04cd73ec005365033542128068d101526a7fb939521acb0e692cb3a72f82efdc7231248083f41f8d1f53467b02c24bef174087de50