Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2024, 00:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
rains hwid (1).exe
Resource
win7-20240705-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
rains hwid (1).exe
Resource
win10v2004-20240802-en
3 signatures
150 seconds
General
-
Target
rains hwid (1).exe
-
Size
16.1MB
-
MD5
b70faa6bea34432debd749f3b1b8720e
-
SHA1
3f368053e654892c3f9b3ecdfd6962ce88364e5d
-
SHA256
12eb7fd26d6593a71a30b1b2d16e720788f74a5123b98ad97f9a45cf72ba05ec
-
SHA512
74d3ec1780c6d242957cb1a4874de8a55b01c72cae3eac859171bdae7435ebd2b7015be5030896d490945b6fe8037dc78af287b8de1ded75a7e96023e909e442
-
SSDEEP
393216:pv7QI+Zc7sa/p8fSbvaXjbvv3i/3Ky6wEIR8gUBzgJCjR4P:1ucwa/q6vArS7EIR8Nte
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4524 rains hwid (1).exe 4524 rains hwid (1).exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4524 rains hwid (1).exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4524 wrote to memory of 2264 4524 rains hwid (1).exe 84 PID 4524 wrote to memory of 2264 4524 rains hwid (1).exe 84 PID 2264 wrote to memory of 2036 2264 cmd.exe 86 PID 2264 wrote to memory of 2036 2264 cmd.exe 86 PID 2264 wrote to memory of 1940 2264 cmd.exe 87 PID 2264 wrote to memory of 1940 2264 cmd.exe 87 PID 2264 wrote to memory of 3120 2264 cmd.exe 88 PID 2264 wrote to memory of 3120 2264 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\rains hwid (1).exe"C:\Users\Admin\AppData\Local\Temp\rains hwid (1).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\rains hwid (1).exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\rains hwid (1).exe" MD53⤵PID:2036
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1940
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:3120
-
-