Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 05:02
Behavioral task
behavioral1
Sample
6d204d922f0b5425927b96659cdae47f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6d204d922f0b5425927b96659cdae47f.exe
Resource
win10v2004-20231215-en
General
-
Target
6d204d922f0b5425927b96659cdae47f.exe
-
Size
2.7MB
-
MD5
6d204d922f0b5425927b96659cdae47f
-
SHA1
3054b75ecf4772f82761458655cd878a90666e1a
-
SHA256
9e0ae9d42ca5435a1463895b65f75ae81dd10ac649ddb54c9454a09673b8c6ba
-
SHA512
ea64cd111df1f1cde20dd69ef0a3e22ebbc2d7d1442bf724a392a142730237467dc6f984ede601871946508eb4afc15ef865a20f4f9a09afab9ff1195bbb35f7
-
SSDEEP
49152:Jpz45WlmPHK/kImkGs5MW1R9Uvc3m/MPV3G8C26JY6R1lstNS8va4R9j:JVLuHKctkGWFHUv38C5hX+Ska4Hj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4840 6d204d922f0b5425927b96659cdae47f.exe -
Executes dropped EXE 1 IoCs
pid Process 4840 6d204d922f0b5425927b96659cdae47f.exe -
resource yara_rule behavioral2/memory/4456-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000300000001f45f-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4456 6d204d922f0b5425927b96659cdae47f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4456 6d204d922f0b5425927b96659cdae47f.exe 4840 6d204d922f0b5425927b96659cdae47f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4456 wrote to memory of 4840 4456 6d204d922f0b5425927b96659cdae47f.exe 19 PID 4456 wrote to memory of 4840 4456 6d204d922f0b5425927b96659cdae47f.exe 19 PID 4456 wrote to memory of 4840 4456 6d204d922f0b5425927b96659cdae47f.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d204d922f0b5425927b96659cdae47f.exe"C:\Users\Admin\AppData\Local\Temp\6d204d922f0b5425927b96659cdae47f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\6d204d922f0b5425927b96659cdae47f.exeC:\Users\Admin\AppData\Local\Temp\6d204d922f0b5425927b96659cdae47f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4840
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD567c461a0599b7cbfc66416b14816bec7
SHA1fe178a3ce682dbc03954bf054f7a115a8873b1fe
SHA256bb1617b1a66005850e12f8c4f4c978109e1b39b54be46ca3762ffac44db28406
SHA5126d860c196573f337189c001fd5478eb34c16fee81097275a02511bb60aec1a4c901063b36037b505e40e66864a28d70eb616601b6d6ae7e02655a3e87b94d1d4