Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2023, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
unlocker-setup.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
unlocker-setup.exe
Resource
win10v2004-20230703-en
General
-
Target
unlocker-setup.exe
-
Size
2.1MB
-
MD5
646261d89e30c36b938da1d7134691c9
-
SHA1
b25491854b409f454277586d97d2ead28168e6ec
-
SHA256
2efdffd1cf3adab21ff760f009d8893d8c4cbcf63b2c3bfcc1139457c9cd430b
-
SHA512
529160fe12a38d986f0b670d0334acc377490b86dc30e6d03227507b1f28b0d85ed17a4f1351108e516bf1635d5f5d73b10e6cc39fcc87e7e94b486c10fcde82
-
SSDEEP
49152:3mpEKwG7f0e4qkpPNFXbMXuesDNkferBmyYwfPG:0EKwwfjYFFXNesuoPG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2824 unlocker-setup.tmp -
Loads dropped DLL 1 IoCs
pid Process 2824 unlocker-setup.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2824 2708 unlocker-setup.exe 86 PID 2708 wrote to memory of 2824 2708 unlocker-setup.exe 86 PID 2708 wrote to memory of 2824 2708 unlocker-setup.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\unlocker-setup.exe"C:\Users\Admin\AppData\Local\Temp\unlocker-setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\is-5ECUU.tmp\unlocker-setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-5ECUU.tmp\unlocker-setup.tmp" /SL5="$B003E,1689069,139776,C:\Users\Admin\AppData\Local\Temp\unlocker-setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2824
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5fbb6d0b67050d1ee042db466ba03d174
SHA10dcbf75fb11a218825b3921a759f7e34674d38e6
SHA256ed72dfbdc876c601c6cd5048f71976ea4eae477fe18ddf8e0e02c88a872f60be
SHA512b3f4f82102bd2758cd3afc5fa5a561a820f6b1e770f85e80de487ec3d44fe4a1acd4d461886b88416d3acc6536c37120aea4de1b9c8d0571851ec60ab863fe14
-
Filesize
79KB
MD52c6233c8dbc560027ee1427f5413e4b1
SHA188b7d4b896539abd11a7ad9376ef62d6a7f42896
SHA25637d2a1626dc205d60f0bec8746ab256569267e4ef2f8f84dff4d9d792aa3af30
SHA512cc8b369b27b303dbe1daef20fa4641f0c4c46b7698d893785fa79877b5a4371574b1bb48a71b0b7b5169a5f09a2444d66e773d8bb42760cb27f4d48a286728a8