Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe
Resource
win10v2004-20240709-en
General
-
Target
3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe
-
Size
2.5MB
-
MD5
f567e516f4a332bc5357ccf20a7d010e
-
SHA1
ae8eb4b86374d0aaf25ce990a2a786e2b3227409
-
SHA256
3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544
-
SHA512
00ba84c9486cd474ac0ceee64f4ff3c0c1456f41d5b929e7b6ab9a4562c0bb6ca4865571645db34963ee7bc780dd641f67153f28d25a9a9b56ec69eaedecd530
-
SSDEEP
49152:Il6666666666666666666666666666666x666666666666666fwwwwwwwwwwwwwd:q666666666666666666666666666666u
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1192 3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe 1192 3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe 1936 3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe 1936 3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1936 1192 3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe 84 PID 1192 wrote to memory of 1936 1192 3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe 84 PID 1192 wrote to memory of 1936 1192 3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe"C:\Users\Admin\AppData\Local\Temp\3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe"C:\Users\Admin\AppData\Local\Temp\3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe" --statistics=https://api.browser.yandex.ru/installstats/send/dtype=stred/pid=457/cid=72992/path=extended_stat/vars=-action=service_unused,-brand_id=unknown,-error=UNKNOWN_COMMAND,-installer_type=service,-launched=false,-old_style=1,-old_ver=,-result=0,-stage=error,-ui=29A49FBA_6AB3_4DFF_ABFB_42773A631A22/*2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD564209a9880bad28c73c72ca3880ac732
SHA16affb1a242641aa8f71ea1510c6dfcdac280a8be
SHA256fc15d25a950ec39f56f3055e53e8ba0da6ca5d94be1bb70cc42152aa4a67ea63
SHA512ed3cc0752a021386f485b6919e46b76f18370168113808cec6ff019ac39ca1ccbfbe4d6b602370b280c49986a59985b09a4aa3f4f8dd4e2538d7c0b4e9e59382
-
Filesize
3KB
MD54b02c5d37101c6dbd1599ad610c04eda
SHA159a2f1b860f90c1cb07b0f0b4e6f2eab82ecca26
SHA25632c422aaf44a412ac02f653b9d21a943657687f03ff68be236900a027dbc6b0a
SHA512dda81f6b9615ba3305a3f0fe710842d83c182c1c7e57722d8293bdae75d24ee7ab69937f08175ef0306e750a9660f3cb7ba89dc551fcea431f48d732cee367f0
-
Filesize
4KB
MD5f14203b5c296749f5ed86364dc5923ee
SHA1b93635a7a6839b10e2bab5065e589275445729a2
SHA2562f0c1aca2c87751ba9ec8b27f80988062aa1756c3a2295409ced119c4d874068
SHA512a04e16ffe2bd1a731f95d313c51fd9d667a2e5ed32e5ede2881a49d3ad4740ffc1f700a5cdebd48c2d7257dbc03fe7f0fa65d571ae9910897eb9497ba226e3b3