Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
98s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/06/2024, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
370ad2de0197df732a290ed6580c34c1ea2960c4de826b95420c50fe40b07ada.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
370ad2de0197df732a290ed6580c34c1ea2960c4de826b95420c50fe40b07ada.exe
Resource
win11-20240508-en
General
-
Target
370ad2de0197df732a290ed6580c34c1ea2960c4de826b95420c50fe40b07ada.exe
-
Size
13KB
-
MD5
8eabfe96feb8dc256ee17c0afa482f4b
-
SHA1
c106a7e08704b96ab0c982e090c49e8fe34f4e81
-
SHA256
370ad2de0197df732a290ed6580c34c1ea2960c4de826b95420c50fe40b07ada
-
SHA512
da6f1aaf73ce3dd9133b7539ae2f62bda3cce7dcbfb4b16ffec573afdb2a705980f09d6d9d0f4731388872506a62a95ee6830c1d1921395f97e4cdf30a3e2ced
-
SSDEEP
192:tYEI1BDJJ4yWSP6vmGFPY7B7nW/jmPgs2KF3ceNMLlQyb+jWlJdxqHmf1xPu:/ij4I5/GnVS++jWlJj+O
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4820 242607065809323.exe 2936 242607065820104.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3644 wrote to memory of 3660 3644 370ad2de0197df732a290ed6580c34c1ea2960c4de826b95420c50fe40b07ada.exe 83 PID 3644 wrote to memory of 3660 3644 370ad2de0197df732a290ed6580c34c1ea2960c4de826b95420c50fe40b07ada.exe 83 PID 3660 wrote to memory of 4820 3660 cmd.exe 84 PID 3660 wrote to memory of 4820 3660 cmd.exe 84 PID 4820 wrote to memory of 4496 4820 242607065809323.exe 85 PID 4820 wrote to memory of 4496 4820 242607065809323.exe 85 PID 4496 wrote to memory of 2936 4496 cmd.exe 86 PID 4496 wrote to memory of 2936 4496 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\370ad2de0197df732a290ed6580c34c1ea2960c4de826b95420c50fe40b07ada.exe"C:\Users\Admin\AppData\Local\Temp\370ad2de0197df732a290ed6580c34c1ea2960c4de826b95420c50fe40b07ada.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607065809323.exe 0000012⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\242607065809323.exeC:\Users\Admin\AppData\Local\Temp\242607065809323.exe 0000013⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607065820104.exe 0000024⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\242607065820104.exeC:\Users\Admin\AppData\Local\Temp\242607065820104.exe 0000025⤵
- Executes dropped EXE
PID:2936
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5ea16dcdcbb24f780b75dcbadcb0b1297
SHA1106473875dd8f276a073f0116af61b144372e16d
SHA256374d691a4287cdf6d4c5085a90edf715b03cbe556b25042eaa0e355cd2fd22d1
SHA512caa2830ce7ff0f82348fdbb601dfba85653f596989798846a1f46934fd76732316f4244df92df83519077455a631ae706aa517d1d8155c8a5e9849bd1d02cf9e
-
Filesize
14KB
MD507b1d2c0f718126896e8a57256ee6dfc
SHA10a5ca89de1ded6ba58cd6b16ef7c2f0d918776e4
SHA256466ed5e6f29c455baefb6a7795bd0c7429ea4a4704817fd6ef0a6475ac40cd69
SHA512c15fd1275a792ceef386c99cf662348e98e05391f89e59639fba1311771f0ee778bd30feaee373a551ee33c585de2265273c13ae2378fa5d5ac8b25db9916d7e