Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 07:42
Behavioral task
behavioral1
Sample
7a66a364fd8b698ef866c155f9fec8f3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a66a364fd8b698ef866c155f9fec8f3.exe
Resource
win10v2004-20231215-en
General
-
Target
7a66a364fd8b698ef866c155f9fec8f3.exe
-
Size
5.3MB
-
MD5
7a66a364fd8b698ef866c155f9fec8f3
-
SHA1
cc562138e3ec63b775b0a4b273ade4f7e135e651
-
SHA256
6f355f8d4f2924baa4f8cb0de0635489019a1113e10bb91e92c96366ccc2bc1a
-
SHA512
86bf6ab07654416e456020f1e431cbd10ad1137590a59d8035f4c2613c787d383626fff9f2d2277b761d57192326154c5ca06731afaef6c1f198a60270217ab7
-
SSDEEP
98304:HLAnfG/UrSSy8jvMeK/xxNmJs9EwkvSsv2wekTM77BgjvMeK/xxNmJs9Ef:HLAnBuP6MeK/x9Gv9dgfMMeK/x94
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1872 7a66a364fd8b698ef866c155f9fec8f3.exe -
Executes dropped EXE 1 IoCs
pid Process 1872 7a66a364fd8b698ef866c155f9fec8f3.exe -
resource yara_rule behavioral2/memory/3928-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023208-11.dat upx behavioral2/memory/1872-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3928 7a66a364fd8b698ef866c155f9fec8f3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3928 7a66a364fd8b698ef866c155f9fec8f3.exe 1872 7a66a364fd8b698ef866c155f9fec8f3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3928 wrote to memory of 1872 3928 7a66a364fd8b698ef866c155f9fec8f3.exe 92 PID 3928 wrote to memory of 1872 3928 7a66a364fd8b698ef866c155f9fec8f3.exe 92 PID 3928 wrote to memory of 1872 3928 7a66a364fd8b698ef866c155f9fec8f3.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a66a364fd8b698ef866c155f9fec8f3.exe"C:\Users\Admin\AppData\Local\Temp\7a66a364fd8b698ef866c155f9fec8f3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\7a66a364fd8b698ef866c155f9fec8f3.exeC:\Users\Admin\AppData\Local\Temp\7a66a364fd8b698ef866c155f9fec8f3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1872
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5dcae72ce9040533d07b1f4d96668b092
SHA1b61c1d91ed0ace988111ab75ad8340860c3f4176
SHA256886148d3944ca76322100dc577982832f61864a5184046c1a9849405ea9dec17
SHA51237aee591376f9ca3ea893a8380e79ac03541406313d6850507ac30358b59389b83fd3b824b4c8da1ce26df8645f0197c38d315ab281739db8cad2643d6dc008c