Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

27/05/2024, 22:11 UTC

240527-14ae9ada43 10

27/05/2024, 21:15 UTC

240527-z3zhbabd59 10

13/02/2024, 12:11 UTC

240213-pcwzdshd2w 10

13/02/2024, 12:08 UTC

240213-pa6qtahc7y 10

18/12/2023, 08:13 UTC

231218-j4g2nabaf5 10

05/12/2023, 08:54 UTC

231205-kt32taae27 10

05/12/2023, 07:41 UTC

231205-jjdthahh6w 10

05/12/2023, 07:38 UTC

231205-jgmcvshh5x 10

26/11/2023, 09:39 UTC

231126-lmxf5agd87 10

Analysis

  • max time kernel
    1792s
  • max time network
    1652s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231129-en
  • resource tags

    arch:x64arch:x86image:win11-20231129-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    05/12/2023, 08:54 UTC

General

  • Target

    Malware-database-main/butterflyondesktop.exe

  • Size

    2.8MB

  • MD5

    1535aa21451192109b86be9bcc7c4345

  • SHA1

    1af211c686c4d4bf0239ed6620358a19691cf88c

  • SHA256

    4641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6

  • SHA512

    1762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da

  • SSDEEP

    49152:5aA7f7tlVmdqK23H2bpHI4Qs5ABV9WRHZRsgI82lcHGAaKLinXBgJ:Q+VMkX224QsWBq5SfARGRgJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Malware-database-main\butterflyondesktop.exe
    "C:\Users\Admin\AppData\Local\Temp\Malware-database-main\butterflyondesktop.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3756
    • C:\Users\Admin\AppData\Local\Temp\is-J9KT2.tmp\butterflyondesktop.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-J9KT2.tmp\butterflyondesktop.tmp" /SL5="$50204,2719719,54272,C:\Users\Admin\AppData\Local\Temp\Malware-database-main\butterflyondesktop.exe"
      2⤵
      • Executes dropped EXE
      PID:4756

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-J9KT2.tmp\butterflyondesktop.tmp

    Filesize

    688KB

    MD5

    c765336f0dcf4efdcc2101eed67cd30c

    SHA1

    fa0279f59738c5aa3b6b20106e109ccd77f895a7

    SHA256

    c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

    SHA512

    06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

  • C:\Users\Admin\AppData\Local\Temp\is-J9KT2.tmp\butterflyondesktop.tmp

    Filesize

    688KB

    MD5

    c765336f0dcf4efdcc2101eed67cd30c

    SHA1

    fa0279f59738c5aa3b6b20106e109ccd77f895a7

    SHA256

    c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

    SHA512

    06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

  • memory/3756-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3756-2-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3756-13-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4756-7-0x0000000002440000-0x0000000002441000-memory.dmp

    Filesize

    4KB

  • memory/4756-14-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/4756-17-0x0000000002440000-0x0000000002441000-memory.dmp

    Filesize

    4KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.