Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
1563b9bc46c56d0e44324da3ced69bcb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1563b9bc46c56d0e44324da3ced69bcb.exe
Resource
win10v2004-20231215-en
General
-
Target
1563b9bc46c56d0e44324da3ced69bcb.exe
-
Size
84KB
-
MD5
1563b9bc46c56d0e44324da3ced69bcb
-
SHA1
42fddbdfc2b6da18ebf17601b5ac7f7fe4d0bec0
-
SHA256
54bbf05ae676ce3c3e96bf5e0fa5e8aa354750e5191e3d776f6503e786970414
-
SHA512
7dd212849af7304610a5caacc25787b9f600984212d407c0e23ce0df076735617db49f08517a018767d7f36cb4386bc8cc63b4f563992456d2893a6e8ea7fb91
-
SSDEEP
1536:Qr83hLy+pyvZLAW5MpY0CEiKB6GM7zSuv/OCpg90KX6aTk98jl:nu+p4ZdMpXCEiKwfS5Cpq0KXdTk98jl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4168 1563b9bc46c56d0e44324da3ced69bcb.exe -
Executes dropped EXE 1 IoCs
pid Process 4168 1563b9bc46c56d0e44324da3ced69bcb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3604 1563b9bc46c56d0e44324da3ced69bcb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3604 1563b9bc46c56d0e44324da3ced69bcb.exe 4168 1563b9bc46c56d0e44324da3ced69bcb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3604 wrote to memory of 4168 3604 1563b9bc46c56d0e44324da3ced69bcb.exe 54 PID 3604 wrote to memory of 4168 3604 1563b9bc46c56d0e44324da3ced69bcb.exe 54 PID 3604 wrote to memory of 4168 3604 1563b9bc46c56d0e44324da3ced69bcb.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\1563b9bc46c56d0e44324da3ced69bcb.exe"C:\Users\Admin\AppData\Local\Temp\1563b9bc46c56d0e44324da3ced69bcb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\1563b9bc46c56d0e44324da3ced69bcb.exeC:\Users\Admin\AppData\Local\Temp\1563b9bc46c56d0e44324da3ced69bcb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4168
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD57af890c2fcf14c280155cf52d72c8507
SHA1948073ea65d0dfb2a2548ac2a9fc6e863c551e64
SHA2568311295d181b2d94d692bea2410054fe11513c96e162d2d20a3a7fd5f6b40a83
SHA5127140f4a9dc77713045bb639d263875e745ea12f242e5c752af8566b4dddf501285eba2548645a723fb9fa96e0a4e343d177bafbd01ad2ae908a52ebae8e8ede4