Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/06/2024, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
d675289637c68ef1d1594866ecbab8087c229d8b0c3b0a65f42f0620fe43518f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
d675289637c68ef1d1594866ecbab8087c229d8b0c3b0a65f42f0620fe43518f.exe
Resource
win11-20240426-en
General
-
Target
d675289637c68ef1d1594866ecbab8087c229d8b0c3b0a65f42f0620fe43518f.exe
-
Size
12KB
-
MD5
d74568914f56b34b011d5d751eb16889
-
SHA1
880bd13ca4e4f5ca7c780daaf21503e1576c0339
-
SHA256
d675289637c68ef1d1594866ecbab8087c229d8b0c3b0a65f42f0620fe43518f
-
SHA512
7866144d059e1cb959300eb6f969b716e0d905040c5239c6b7a5e462764b1f9c94e4397e17217aff53d0bb036583ea446a1b1829b81cab570c5cda919eb6b78a
-
SSDEEP
192:uk8rI1lJYWNzMF6vZCPYods2nDfFknTP3BchLlmqRQhWhSWlJdxqHxL1x:aYKK4c+cg4qCsMWlJj+z
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1440 242607071043254.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4048 wrote to memory of 1432 4048 d675289637c68ef1d1594866ecbab8087c229d8b0c3b0a65f42f0620fe43518f.exe 77 PID 4048 wrote to memory of 1432 4048 d675289637c68ef1d1594866ecbab8087c229d8b0c3b0a65f42f0620fe43518f.exe 77 PID 1432 wrote to memory of 1440 1432 cmd.exe 78 PID 1432 wrote to memory of 1440 1432 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\d675289637c68ef1d1594866ecbab8087c229d8b0c3b0a65f42f0620fe43518f.exe"C:\Users\Admin\AppData\Local\Temp\d675289637c68ef1d1594866ecbab8087c229d8b0c3b0a65f42f0620fe43518f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\242607071043254.exe 0000012⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\242607071043254.exeC:\Users\Admin\AppData\Local\Temp\242607071043254.exe 0000013⤵
- Executes dropped EXE
PID:1440
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD50252de2535e39dab88d4efef91491730
SHA1197fa310f4bc6ecf79d84a2a361300dd2a6de4d3
SHA25646a7c7cd752ed59f7aaa24442adc8dc06a82d3e228be1c25b9a9d4d370c1bc78
SHA512cc0b2fe8a34fe2b3678462ffebfe2c761a1e74a5306a93609bb80297b46396f7e9330f01355aabcf3f3a577883c5d387916ddc96fb6843614b2a161332077628