Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/06/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe
Resource
win11-20240426-en
General
-
Target
a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe
-
Size
12KB
-
MD5
a8c4c40b7ed30dc2ddce7439b8b269d1
-
SHA1
90c75c42fc6cda1a51f2a4333ec8f0e08c4286a5
-
SHA256
a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea
-
SHA512
56ac9f14768d3bab481ad842b3b1a2cdc3df3ec5a76527c0d4d836684fed87aebeeee529507ae73434a7bf6f31a7d08bdd1732f37f962ee1a9e1ce84a87cd339
-
SSDEEP
192:L1hrI1SyJzDl6hG/PTndpa/Wh/KzPwhKiEL6ryN1Q9WlJdxqHbo1xx:Rh+J/r/uP4WgWlJj+WT
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 2856 242607061745260.exe 2448 242607061757167.exe 2620 242607061833370.exe 1092 242607061918260.exe 644 242607061935917.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4032 wrote to memory of 3180 4032 a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe 77 PID 4032 wrote to memory of 3180 4032 a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe 77 PID 3180 wrote to memory of 2856 3180 cmd.exe 78 PID 3180 wrote to memory of 2856 3180 cmd.exe 78 PID 2856 wrote to memory of 972 2856 242607061745260.exe 79 PID 2856 wrote to memory of 972 2856 242607061745260.exe 79 PID 972 wrote to memory of 2448 972 cmd.exe 80 PID 972 wrote to memory of 2448 972 cmd.exe 80 PID 2448 wrote to memory of 4208 2448 242607061757167.exe 81 PID 2448 wrote to memory of 4208 2448 242607061757167.exe 81 PID 4208 wrote to memory of 2620 4208 cmd.exe 82 PID 4208 wrote to memory of 2620 4208 cmd.exe 82 PID 2620 wrote to memory of 568 2620 242607061833370.exe 83 PID 2620 wrote to memory of 568 2620 242607061833370.exe 83 PID 568 wrote to memory of 1092 568 cmd.exe 84 PID 568 wrote to memory of 1092 568 cmd.exe 84 PID 1092 wrote to memory of 828 1092 242607061918260.exe 85 PID 1092 wrote to memory of 828 1092 242607061918260.exe 85 PID 828 wrote to memory of 644 828 cmd.exe 86 PID 828 wrote to memory of 644 828 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe"C:\Users\Admin\AppData\Local\Temp\a0a733c9606529d21370bdeafd1a49e6bffa55b4574863e9bdc272c0f8dd20ea.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061745260.exe 0000012⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\242607061745260.exeC:\Users\Admin\AppData\Local\Temp\242607061745260.exe 0000013⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061757167.exe 0000024⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\242607061757167.exeC:\Users\Admin\AppData\Local\Temp\242607061757167.exe 0000025⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061833370.exe 0000036⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\242607061833370.exeC:\Users\Admin\AppData\Local\Temp\242607061833370.exe 0000037⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061918260.exe 0000048⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\242607061918260.exeC:\Users\Admin\AppData\Local\Temp\242607061918260.exe 0000049⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607061935917.exe 00000510⤵
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\242607061935917.exeC:\Users\Admin\AppData\Local\Temp\242607061935917.exe 00000511⤵
- Executes dropped EXE
PID:644
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD553b9e35fd4e8ccc856632aabf8d6b94f
SHA1c5119a6381166eae05d3a18b0fa9eaf122801f82
SHA2564b11c88005f0156b38922c68fa3988906703f55019823c76f4fff63b7a078d9b
SHA512c7aa0fd2f507941c14116fdb6d9c520be6f3b957db835e58876d28632084b41bbcdd78ed0d570c2e1fabad7a8d3d4ca541dc553c7b2000f841464330624e6ca0
-
Filesize
13KB
MD580670d4ebdee8149fadf885c8fa8c34f
SHA15e54fe44cba282383d120b609bc0cb211de5ad8d
SHA2562609c8c078261a6901c3f4144b6c00c4e61e3fcb5944b4b7c0f1bb86a01cc1c3
SHA5124f611c9ba6b44b0ea3ec7362c260561b7b9d818945e1b065a6242a3fab80bb41dde0eb59ffb01e443d117f9230fda7007d9ff84a3329ada63e77c454b778873a
-
Filesize
13KB
MD5068b50da1384d802e30d2d3160668327
SHA122a5466b1d71fa39471feda11ae3f641bc7e40d0
SHA256aa21d6f1727412e5fb94ef22a8acfbeb0cce5388e4375be86ea09c4bcf8db05d
SHA5122f7883d5f36830fb0882ee180969b9456054a784c5347801d04fe253d0f49e07177f5bbe5441decc78659e56c4c038d9d8b5f6a76f3840b83d248505a8877f7e
-
Filesize
13KB
MD5afdadde0c60ee545eeed275cbd803bf0
SHA15e0997064a12a0875919fb16414924a58a565df9
SHA2565276ceffe1a3db68a47b3a9d4e0f904de04a30bba51c17a2ff78abbdb671566e
SHA5127ad7e128d5b2a1f82ee3c8b0966e60c598eedcc8dfe55ba8df73df9af291e43c06ad24ef9e4200b6db7057790e2e8c2bb2dfdb9683b2f03a177dad5b5acfe185
-
Filesize
13KB
MD5fb6f1f89e76ba2195f9d4861d8c8298c
SHA100336ad84e1a95de4b6e9e20869f291f05c765d5
SHA256366cc808bc98f67d46a794fef90d2c7ad348670137dbbfb417e3b28039e2f1aa
SHA512134379a0c88fb75188540c04cd73ec005365033542128068d101526a7fb939521acb0e692cb3a72f82efdc7231248083f41f8d1f53467b02c24bef174087de50