Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
214s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
0107d79ab0d238b9448226d7a72b5ca0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0107d79ab0d238b9448226d7a72b5ca0.exe
Resource
win10v2004-20231215-en
General
-
Target
0107d79ab0d238b9448226d7a72b5ca0.exe
-
Size
84KB
-
MD5
0107d79ab0d238b9448226d7a72b5ca0
-
SHA1
810525cd2aed2b1a156d062daafd234ef8c4ddaa
-
SHA256
79d41dc3b1a7b48e03b04193f52d5eafa3e090661f2539e7b484a9f0eba4b9ed
-
SHA512
23db01b338b8e5f838c3951b48fc452ef3a5b7c436e572c3dce0027ea5679e69dc9889e3077441b4dbcc2b66e8783dfdd1360fbb945d7cc49a8cb838558d075b
-
SSDEEP
1536:cwym675Y7eb0yT6xFEQek31EdP07T/KV2FVnVJxwhTjevRjoNTwu9Hp12L9y1:UhQysSQx1O8nA2F7fwhTKp0N8CHpUxG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4064 0107d79ab0d238b9448226d7a72b5ca0.exe -
Executes dropped EXE 1 IoCs
pid Process 4064 0107d79ab0d238b9448226d7a72b5ca0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2468 0107d79ab0d238b9448226d7a72b5ca0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2468 0107d79ab0d238b9448226d7a72b5ca0.exe 4064 0107d79ab0d238b9448226d7a72b5ca0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2468 wrote to memory of 4064 2468 0107d79ab0d238b9448226d7a72b5ca0.exe 90 PID 2468 wrote to memory of 4064 2468 0107d79ab0d238b9448226d7a72b5ca0.exe 90 PID 2468 wrote to memory of 4064 2468 0107d79ab0d238b9448226d7a72b5ca0.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0107d79ab0d238b9448226d7a72b5ca0.exe"C:\Users\Admin\AppData\Local\Temp\0107d79ab0d238b9448226d7a72b5ca0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\0107d79ab0d238b9448226d7a72b5ca0.exeC:\Users\Admin\AppData\Local\Temp\0107d79ab0d238b9448226d7a72b5ca0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4064
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD531975c00890c0fb87fc5297451a159ec
SHA1765fb46889dccb1e327a4ec8f39e0e64d44936dc
SHA2567c3c27115f5d3ff35803f6914c0ed259389cae809b4dc990f659954e1ccd5e98
SHA5123fde6c1f8e89ab0769a0bd3fa503aa206c5c4fcbca60bb4a501da51b7a6d6f0a3e507fe00ea68f69b493ec888bafe2e277440b65bbecb83dbb1d8a91e8e0a671