Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 15:06
Behavioral task
behavioral1
Sample
d1b366ba2b2720db8d9967dadcefd252.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d1b366ba2b2720db8d9967dadcefd252.exe
Resource
win10v2004-20231215-en
General
-
Target
d1b366ba2b2720db8d9967dadcefd252.exe
-
Size
2.7MB
-
MD5
d1b366ba2b2720db8d9967dadcefd252
-
SHA1
6adbbc4ce937b9a844ba593d4aa009600ea1f3cc
-
SHA256
3e8eb24770d2d3281550209f567d98f3e8fa654c245efb186f2e416f2c59fad7
-
SHA512
2d7a3b5c27da232b87c5f001a70dce766c91ebc08501871e8f790cd662ec04623d449d418112a6688b495c81e477a4937c22f5cc02f6ab6e8e82d422c56fbdfc
-
SSDEEP
49152:K8g7or+6RjF9GFAnANjcNCpGz1D0kQGduCjfpBDruSZPu:K80u+s59yAKjWSipduCjxBDruSZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3888 d1b366ba2b2720db8d9967dadcefd252.exe -
Executes dropped EXE 1 IoCs
pid Process 3888 d1b366ba2b2720db8d9967dadcefd252.exe -
resource yara_rule behavioral2/files/0x00070000000231fe-12.dat upx behavioral2/memory/3916-0-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3916 d1b366ba2b2720db8d9967dadcefd252.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3916 d1b366ba2b2720db8d9967dadcefd252.exe 3888 d1b366ba2b2720db8d9967dadcefd252.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3916 wrote to memory of 3888 3916 d1b366ba2b2720db8d9967dadcefd252.exe 19 PID 3916 wrote to memory of 3888 3916 d1b366ba2b2720db8d9967dadcefd252.exe 19 PID 3916 wrote to memory of 3888 3916 d1b366ba2b2720db8d9967dadcefd252.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1b366ba2b2720db8d9967dadcefd252.exe"C:\Users\Admin\AppData\Local\Temp\d1b366ba2b2720db8d9967dadcefd252.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\d1b366ba2b2720db8d9967dadcefd252.exeC:\Users\Admin\AppData\Local\Temp\d1b366ba2b2720db8d9967dadcefd252.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3888
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5a2b2af0c494f2a35c9737fe36a53b066
SHA1f3ab34011ce0759e84278edfaacb268cee40778a
SHA2568c51072269eb68416b334ea4418bd6b6fc3754a07ead542d362acff13785ec92
SHA5126d0477312e6458cba0c962c0be34e2fc560d1f829e5ef1a97e9b950e9ad43eebb7cec517cbe3aa23a756735feb98c185373b5e65cc4bee04f5bad35024c685d1