Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 15:42
Behavioral task
behavioral1
Sample
ddf867e2a639299bfe5f4dde6ec5667a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ddf867e2a639299bfe5f4dde6ec5667a.exe
Resource
win10v2004-20231222-en
General
-
Target
ddf867e2a639299bfe5f4dde6ec5667a.exe
-
Size
4.8MB
-
MD5
ddf867e2a639299bfe5f4dde6ec5667a
-
SHA1
b019acf8c7f80540a617ba6d30ecbedcb8359d6d
-
SHA256
6465637f81415822ba51245da5fea5bf904168a07de6992390f441bea9e93fb5
-
SHA512
5e98bd9e1b6f2c71d8eab4bfd2186edae1c30edc5ed2c78379052ae9d2f0fea1da6c9fc2943e79e65a57b868fa690aa9e0098db7ab2ce9ace76ac22749d8c1a0
-
SSDEEP
98304:OHjsj6CThrw6iwvlRgg3gnl/IVUs1jee2Fl4r60Rgg3gnl/IVUs1jr:LNTCdkgl/iB08r6igl/iBP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4332 ddf867e2a639299bfe5f4dde6ec5667a.exe -
Executes dropped EXE 1 IoCs
pid Process 4332 ddf867e2a639299bfe5f4dde6ec5667a.exe -
resource yara_rule behavioral2/memory/4888-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/4332-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000002322d-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4888 ddf867e2a639299bfe5f4dde6ec5667a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4888 ddf867e2a639299bfe5f4dde6ec5667a.exe 4332 ddf867e2a639299bfe5f4dde6ec5667a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4888 wrote to memory of 4332 4888 ddf867e2a639299bfe5f4dde6ec5667a.exe 18 PID 4888 wrote to memory of 4332 4888 ddf867e2a639299bfe5f4dde6ec5667a.exe 18 PID 4888 wrote to memory of 4332 4888 ddf867e2a639299bfe5f4dde6ec5667a.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddf867e2a639299bfe5f4dde6ec5667a.exe"C:\Users\Admin\AppData\Local\Temp\ddf867e2a639299bfe5f4dde6ec5667a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\ddf867e2a639299bfe5f4dde6ec5667a.exeC:\Users\Admin\AppData\Local\Temp\ddf867e2a639299bfe5f4dde6ec5667a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4332
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD535a1389169528728f4b030705de6f6c4
SHA15713efbbe68c72aca1fd5eb422edc34eb2187a64
SHA2566b542970b7ac2b244f356facf34f2820ccfa4011315c466ba92f49f16b774c87
SHA512c1706469a536af4f7123475d0400c15fd042a14092276e16462212791a3e34db8b93db247d9ebe5a474098c25e17fc06a288dfe0fe68bb9af16b02d3ac9fe740