Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
199s -
max time network
248s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 16:59
Behavioral task
behavioral1
Sample
fa31bf0900ade59a187edc03c6855d87.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fa31bf0900ade59a187edc03c6855d87.exe
Resource
win10v2004-20231215-en
General
-
Target
fa31bf0900ade59a187edc03c6855d87.exe
-
Size
5.3MB
-
MD5
fa31bf0900ade59a187edc03c6855d87
-
SHA1
8c540a1d93e1f3abcf7fbddf7ab031c506b1bc92
-
SHA256
cdb91b824093483d5775281248660b19fa8cb9b7a4ba293321d5a199c6b975bb
-
SHA512
872a9e821dff1bf5a90c07e30fcae8f784f99da7eec08da030f6787285c71fb0552ced2c96c8b32ccee2086df8bcb1b0fa7244970fc175507dcb3f5ae9d5b9ef
-
SSDEEP
98304:p4vnhN+Tz+bchPSKwf1EdpS3W4eTz8caEto90yTXJf1EdpS3W4f:IghG1EnwWTTzlaEtoLTX91EnwW8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3040 fa31bf0900ade59a187edc03c6855d87.exe -
Executes dropped EXE 1 IoCs
pid Process 3040 fa31bf0900ade59a187edc03c6855d87.exe -
resource yara_rule behavioral2/memory/4892-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0006000000023205-13.dat upx behavioral2/memory/3040-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4892 fa31bf0900ade59a187edc03c6855d87.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4892 fa31bf0900ade59a187edc03c6855d87.exe 3040 fa31bf0900ade59a187edc03c6855d87.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4892 wrote to memory of 3040 4892 fa31bf0900ade59a187edc03c6855d87.exe 91 PID 4892 wrote to memory of 3040 4892 fa31bf0900ade59a187edc03c6855d87.exe 91 PID 4892 wrote to memory of 3040 4892 fa31bf0900ade59a187edc03c6855d87.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa31bf0900ade59a187edc03c6855d87.exe"C:\Users\Admin\AppData\Local\Temp\fa31bf0900ade59a187edc03c6855d87.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\fa31bf0900ade59a187edc03c6855d87.exeC:\Users\Admin\AppData\Local\Temp\fa31bf0900ade59a187edc03c6855d87.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3040
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5d4997c95a54c1ddaf0cf17039524d497
SHA1215dda19b9fa94f62b94621a556c7f8833cc5f38
SHA256ae9c576a025f220b0f658dd8b5022cff1ffea1b12100c9235e19897807e31b46
SHA512e4120831f2e62975f5492e42c13e7a0abe8702bc7e64494228f4f130c53006709ee27c60643aeb1cdf83e9c55622b8eeb9dd7f2ec171abb8e464b8f4299f6955