Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 13:31
Behavioral task
behavioral1
Sample
a4da8f3883e8ba6fdb295a095b1a748a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a4da8f3883e8ba6fdb295a095b1a748a.exe
Resource
win10v2004-20231215-en
General
-
Target
a4da8f3883e8ba6fdb295a095b1a748a.exe
-
Size
2.7MB
-
MD5
a4da8f3883e8ba6fdb295a095b1a748a
-
SHA1
6035a525d7f7356bd9bc9a094f40881ea3202de2
-
SHA256
17cffb5fdd921e8c289030a5aa1bb9da17d2b071ba677634e5353f97b6a19186
-
SHA512
a2c8e71d5aad021152164ce922d5bfee1151721676defd8093d5f7e2d19587f315245b825f33d4164243f9473b029c12acfa9499e721166c475a5f9debf27309
-
SSDEEP
49152:jMN91ZL5hv+qSvqJHdOljmtePuQ2zgG1ZFBOtHf2nG:ju9fvmyJoltuQGOK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4344 a4da8f3883e8ba6fdb295a095b1a748a.exe -
Executes dropped EXE 1 IoCs
pid Process 4344 a4da8f3883e8ba6fdb295a095b1a748a.exe -
resource yara_rule behavioral2/memory/1928-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000300000001e982-13.dat upx behavioral2/memory/4344-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1928 a4da8f3883e8ba6fdb295a095b1a748a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1928 a4da8f3883e8ba6fdb295a095b1a748a.exe 4344 a4da8f3883e8ba6fdb295a095b1a748a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1928 wrote to memory of 4344 1928 a4da8f3883e8ba6fdb295a095b1a748a.exe 92 PID 1928 wrote to memory of 4344 1928 a4da8f3883e8ba6fdb295a095b1a748a.exe 92 PID 1928 wrote to memory of 4344 1928 a4da8f3883e8ba6fdb295a095b1a748a.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4da8f3883e8ba6fdb295a095b1a748a.exe"C:\Users\Admin\AppData\Local\Temp\a4da8f3883e8ba6fdb295a095b1a748a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\a4da8f3883e8ba6fdb295a095b1a748a.exeC:\Users\Admin\AppData\Local\Temp\a4da8f3883e8ba6fdb295a095b1a748a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4344
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD564a25aa43909ea64cf3865ae8675c550
SHA10d75442ed1f5292ac03d61be13deedadb95c7928
SHA25630fdc296f32cc50a9628a3f7a92a4b48558399ac619240c358621927e67a1b6b
SHA51208a0ac626fb3bd68f936d3a6670c46658977e31547d67902330b39524038d5dd2fdc135ce3d5b4ec7c26fe51b4d69888409587109ba02bdf5ba029dd26a3c579