Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
9335ea5a12af26b81d42abbe6db47014bd9a10b6047d318ac3e9f3fb2c939d4c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9335ea5a12af26b81d42abbe6db47014bd9a10b6047d318ac3e9f3fb2c939d4c.exe
Resource
win10v2004-20241007-en
General
-
Target
9335ea5a12af26b81d42abbe6db47014bd9a10b6047d318ac3e9f3fb2c939d4c.exe
-
Size
1.5MB
-
MD5
5b3bd5baf8ab186dd351d303a589e4fa
-
SHA1
d3f7982b2bbb9a7bb90c8ef82d8e7dd32e3f43e1
-
SHA256
9335ea5a12af26b81d42abbe6db47014bd9a10b6047d318ac3e9f3fb2c939d4c
-
SHA512
0762d145b6f70c2137ede6c6457c1f92711431f337ccbb61fa5abcaaf535582b305e82645af762869a4ac67720d607a5a864d2f4af6880d315bcb4c2948e1c41
-
SSDEEP
24576:cNoF9LYbAtK5wlCDtm2MUrabZhcEGHghLjVPT+oU:cNoF9LbEwlKTMwabZjGAhLjlT+5
Malware Config
Signatures
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3964 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 5004 systeminfo.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 532 wrote to memory of 2728 532 9335ea5a12af26b81d42abbe6db47014bd9a10b6047d318ac3e9f3fb2c939d4c.exe 87 PID 532 wrote to memory of 2728 532 9335ea5a12af26b81d42abbe6db47014bd9a10b6047d318ac3e9f3fb2c939d4c.exe 87 PID 2728 wrote to memory of 5004 2728 cmd.exe 89 PID 2728 wrote to memory of 5004 2728 cmd.exe 89 PID 532 wrote to memory of 2260 532 9335ea5a12af26b81d42abbe6db47014bd9a10b6047d318ac3e9f3fb2c939d4c.exe 92 PID 532 wrote to memory of 2260 532 9335ea5a12af26b81d42abbe6db47014bd9a10b6047d318ac3e9f3fb2c939d4c.exe 92 PID 2260 wrote to memory of 3672 2260 cmd.exe 94 PID 2260 wrote to memory of 3672 2260 cmd.exe 94 PID 532 wrote to memory of 1248 532 9335ea5a12af26b81d42abbe6db47014bd9a10b6047d318ac3e9f3fb2c939d4c.exe 95 PID 532 wrote to memory of 1248 532 9335ea5a12af26b81d42abbe6db47014bd9a10b6047d318ac3e9f3fb2c939d4c.exe 95 PID 1248 wrote to memory of 3964 1248 cmd.exe 97 PID 1248 wrote to memory of 3964 1248 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\9335ea5a12af26b81d42abbe6db47014bd9a10b6047d318ac3e9f3fb2c939d4c.exe"C:\Users\Admin\AppData\Local\Temp\9335ea5a12af26b81d42abbe6db47014bd9a10b6047d318ac3e9f3fb2c939d4c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c systeminfo2⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:5004
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c route print2⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\ROUTE.EXEroute print3⤵PID:3672
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c ipconfig /all2⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\system32\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:3964
-
-