Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/07/2024, 12:11

240712-pcnm1ssgnp 7

24/06/2024, 09:09

240624-k4k9ravcld 7

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 12:11

General

  • Target

    6a44d9de18f6cfcdba49c38f8d047e002e594d885f646978d740ee8888019dd2.exe

  • Size

    3.5MB

  • MD5

    b95dbf03eee47eddd34ba2dffe12d7cb

  • SHA1

    6f6430ed66b8f6ab9f91edd297f6efc14ce51c49

  • SHA256

    6a44d9de18f6cfcdba49c38f8d047e002e594d885f646978d740ee8888019dd2

  • SHA512

    4154bae8444577dd90a705d31a9acb7fe2e51ec0768677a1126f3a2cc873e2148b1aa491eaadfca9d6c75e39db4839bb0c5888d348d6389a75cd28118fe554ed

  • SSDEEP

    98304:+m9zYZjN0QuGm92ai+cPajHkaclnNkbsZ3cb:BzYZj6dGmIicPkkj6wE

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3552
      • C:\Users\Admin\AppData\Local\Temp\6a44d9de18f6cfcdba49c38f8d047e002e594d885f646978d740ee8888019dd2.exe
        "C:\Users\Admin\AppData\Local\Temp\6a44d9de18f6cfcdba49c38f8d047e002e594d885f646978d740ee8888019dd2.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4756
        • C:\Users\Admin\AppData\Local\Temp\6a44d9de18f6cfcdba49c38f8d047e002e594d885f646978d740ee8888019dd2.exe
          "C:\Users\Admin\AppData\Local\Temp\6a44d9de18f6cfcdba49c38f8d047e002e594d885f646978d740ee8888019dd2.exe"
          3⤵
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:3872
          • C:\Windows\SysWOW64\explorer.exe
            "C:\Windows\SysWOW64\explorer.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4680
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4680 -s 736
              5⤵
              • Program crash
              PID:4964
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4680 -ip 4680
      1⤵
        PID:1048

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3872-0-0x0000000000400000-0x0000000000758000-memory.dmp

        Filesize

        3.3MB

      • memory/3872-5-0x0000000000400000-0x0000000000758000-memory.dmp

        Filesize

        3.3MB

      • memory/4680-3-0x0000000000260000-0x0000000000693000-memory.dmp

        Filesize

        4.2MB

      • memory/4680-6-0x0000000000260000-0x0000000000693000-memory.dmp

        Filesize

        4.2MB