Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 04:59
Behavioral task
behavioral1
Sample
2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe
Resource
win10v2004-20240802-en
General
-
Target
2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe
-
Size
5.3MB
-
MD5
ff0db96d632fe358e6ef66800f6e8fd3
-
SHA1
00f436a4ed1b96564a52e0fec2bad0daa2027028
-
SHA256
2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0
-
SHA512
023099ab36b8fb5cca561b8f811153d85e6e3561b5fbce24d84ce0be5c4e612196ada54be509cd125254d8b6ab778b20b69e80a75f9a1cad022c27a347408ea5
-
SSDEEP
98304:vc8VeLb+sX1ZvbeeJZ/dJolTlPNs2PKToa1FptF07TUFpMndH2RPTVZqQXy1k+X:vcmeLCsXDjpf/dJolpPgToa10/UFOnJx
Malware Config
Signatures
-
Loads dropped DLL 11 IoCs
pid Process 208 2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe 208 2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe 208 2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe 208 2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe 208 2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe 208 2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe 208 2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe 208 2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe 208 2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe 208 2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe 208 2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1880 wrote to memory of 208 1880 2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe 86 PID 1880 wrote to memory of 208 1880 2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe"C:\Users\Admin\AppData\Local\Temp\2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe"C:\Users\Admin\AppData\Local\Temp\2c2adac067b34b4d773d0f7a001dd4b2d325d483954475b31e7a66be88ca4aa0.exe"2⤵
- Loads dropped DLL
PID:208
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD54a365ffdbde27954e768358f4a4ce82e
SHA1a1b31102eee1d2a4ed1290da2038b7b9f6a104a3
SHA2566a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c
SHA51254e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722
-
Filesize
85KB
MD5a49c5f406456b79254eb65d015b81088
SHA1cfc2a2a89c63df52947af3610e4d9b8999399c91
SHA256ce4ef8ed1e72c1d3a6082d500a17a009eb6e8ed15022bf3b68a22291858feced
SHA512bbafeff8c101c7425dc9b8789117fe4c5e516d217181d3574d9d81b8fec4b0bd34f1e1fe6e406ae95584dc671f788cd7b05c8d700baf59fbf21de9c902edf7ae
-
Filesize
159KB
MD5cf9fd17b1706f3044a8f74f6d398d5f1
SHA1c5cd0debbde042445b9722a676ff36a0ac3959ad
SHA2569209ccc60115727b192bf7771551040ca6fdd50f9bf8c3d2eacbfd424e8245e4
SHA5125fe922c00c6f7fd3cd9bc56fc51de1f44adffbdb0afc0583f1bb08008be628b9ac16f8560b0c3ba16138e1cdcaf1c525ef24241bed804804cdeb5961aed6385a
-
Filesize
78KB
MD54827652de133c83fa1cae839b361856c
SHA1182f9a04bdc42766cfd5fb352f2cb22e5c26665e
SHA25687832a3b89e2ada8f704a8f066013660d591d9ce01ce901cc57a3b973f0858ba
SHA5128d66d68613fdba0820257550de3c39b308b1dce659dca953d10a95ff2cf89c31afe512d30ed44422b31117058dc9fa15279e5ac84694da89b47f99b0ad7e338a
-
Filesize
152KB
MD5d4dfd8c2894670e9f8d6302c09997300
SHA1c3a6cc8d8079a06a4cac8950e0baba2b43fb1f8e
SHA2560a721fc230eca278a69a2006e13dfa00e698274281378d4df35227e1f68ea3e0
SHA5121422bf45d233e2e3f77dce30ba0123625f2a511f73dfdf42ee093b1755963d9abc371935111c28f0d2c02308c5e82867de2546d871c35e657da32a7182026048
-
Filesize
1008KB
MD5eb64bb7e17b788962914a11c997b7118
SHA1f98d41a009144316b0f2b074abb0676674824041
SHA2566f0f43477d1fda625f853edece7bfad275906924eecd48a8549ac79b6f4785fa
SHA512d97fd5caf6bd6fa95015119c4a869005cad7ee6dfafb5ba654d100747ed518715dee6112f8558c412c958d3cb548ec25b1a8f251a2c907098d48ecbabc4ab543
-
Filesize
3.2MB
MD589511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
Filesize
674KB
MD550bcfb04328fec1a22c31c0e39286470
SHA13a1b78faf34125c7b8d684419fa715c367db3daa
SHA256fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9
SHA512370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685
-
Filesize
4.0MB
MD526ba25d468a778d37f1a24f4514d9814
SHA1b64fe169690557656ede3ae50d3c5a197fea6013
SHA2562f3e368f5bcc1dda5e951682008a509751e6395f7328fd0f02c4e1a11f67c128
SHA51280471bfeeab279ce4adfb9ee1962597fb8e1886b861e31bdff1e3aa0df06d93afeb3a3398e9519bab7152d4bd7d88fa9b328a2d7eb50a91eb60fead268912080
-
Filesize
27KB
MD5e21cff76db11c1066fd96af86332b640
SHA1e78ef7075c479b1d218132d89bf4bec13d54c06a
SHA256fcc2e09a2355a5546922874fb4cac92ee00a33c0ed6adbc440d128d1e9f4ec28
SHA512e86dba2326ca5ea3f5ef3af2abd3c23d5b29b6211acc865b6be5a51d5c8850b7cda8c069e6f631ac62f2047224c4b675bbe6ac97c7ba781de5b8016ebaffd46f
-
Filesize
1.0MB
MD5601aee84e12b87ca66826dfc7ca57231
SHA13a7812433ca7d443d4494446a9ced24b6774ceca
SHA256d8091e62c74e1b2b648086f778c3c41ce01f09661a75ea207d3fea2cf26a8762
SHA5127c2d64623c6cfd66d6729f59909c90aa944e810ff6514c58b2b3142ee90e8660b7ddf7fa187389dd333e47efe8b19e935dd4e9119c15375b69b4880d043877d7