Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 14:09
Behavioral task
behavioral1
Sample
b8f00080caadadecb6d4b0bd145897c4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b8f00080caadadecb6d4b0bd145897c4.exe
Resource
win10v2004-20231215-en
General
-
Target
b8f00080caadadecb6d4b0bd145897c4.exe
-
Size
5.3MB
-
MD5
b8f00080caadadecb6d4b0bd145897c4
-
SHA1
fd0bd930feb73eac764a14fef84dc1b08026922c
-
SHA256
94843bc4ff5cb085cfa6a69b32e83a33dea5ed4a8a9965e594decbf3dc57a448
-
SHA512
71f8d1a86c0ceb1f1ca69c629c33a3f11d20ed8632f30ebf07d9f0890f92584e5151ae0cc8ac32a9a5f2d4051eda9f15c13b4fbb9c709ee2a6ba2448180d2750
-
SSDEEP
98304:mmtZOgqt5sFdKcqlC92IZ1Q8tfYxOsTBWGMCE2IZ1Q8tfY:mmCBwyM9pZdwjW/HpZdw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4724 b8f00080caadadecb6d4b0bd145897c4.exe -
Executes dropped EXE 1 IoCs
pid Process 4724 b8f00080caadadecb6d4b0bd145897c4.exe -
resource yara_rule behavioral2/memory/4396-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000600000002321e-13.dat upx behavioral2/memory/4724-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4396 b8f00080caadadecb6d4b0bd145897c4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4396 b8f00080caadadecb6d4b0bd145897c4.exe 4724 b8f00080caadadecb6d4b0bd145897c4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4396 wrote to memory of 4724 4396 b8f00080caadadecb6d4b0bd145897c4.exe 90 PID 4396 wrote to memory of 4724 4396 b8f00080caadadecb6d4b0bd145897c4.exe 90 PID 4396 wrote to memory of 4724 4396 b8f00080caadadecb6d4b0bd145897c4.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8f00080caadadecb6d4b0bd145897c4.exe"C:\Users\Admin\AppData\Local\Temp\b8f00080caadadecb6d4b0bd145897c4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\b8f00080caadadecb6d4b0bd145897c4.exeC:\Users\Admin\AppData\Local\Temp\b8f00080caadadecb6d4b0bd145897c4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4724
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD5b989f05f014180e44568d2083f5782bd
SHA1f2cb212963cb1aa33d79e3fb1ab2ade52ad3b354
SHA256e79bfdc344e7a6387dca7545b6a496d9368358d9045b37dd17f3226fca1cff96
SHA51283e0b7ccb5b6f26fc420be96b6fa685f4efd6f044657ffa3dd162e96291c44739c97905d908c7bea6e22da9a045d62cd440365f1686b805b920038c24ecf8bf8