Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 23:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
42cb5ed776688407e2798c156ce18630.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
42cb5ed776688407e2798c156ce18630.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
42cb5ed776688407e2798c156ce18630.exe
-
Size
165KB
-
MD5
42cb5ed776688407e2798c156ce18630
-
SHA1
a47d4e9f396215ba8bf503b5a37b8aa1897d8267
-
SHA256
2045a18bc2a200fe7f70508177b5b7e4204017e8faad69318f73c5549021f79d
-
SHA512
0c67ded7a8c4baecac211c7f1ea93d1bd20b38e86245d117bf607e4a03e72d3729c8a5cbc4b9af1eb7e37d0c11c6a124a2019a4212498c3c0baf8ae13ae3dc35
-
SSDEEP
3072:eOcJS/WJbzErTMmEmdlzlPwumhWXYzdk7X4nc7UiSYbbbLrByXUySY0vDJfqObhY:eOr/WJbzErTMmEmdFlPwumhWXYRk7X49
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2872 42cb5ed776688407e2798c156ce18630.exe -
Executes dropped EXE 1 IoCs
pid Process 2872 42cb5ed776688407e2798c156ce18630.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5080 42cb5ed776688407e2798c156ce18630.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5080 42cb5ed776688407e2798c156ce18630.exe 2872 42cb5ed776688407e2798c156ce18630.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5080 wrote to memory of 2872 5080 42cb5ed776688407e2798c156ce18630.exe 20 PID 5080 wrote to memory of 2872 5080 42cb5ed776688407e2798c156ce18630.exe 20 PID 5080 wrote to memory of 2872 5080 42cb5ed776688407e2798c156ce18630.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\42cb5ed776688407e2798c156ce18630.exe"C:\Users\Admin\AppData\Local\Temp\42cb5ed776688407e2798c156ce18630.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\42cb5ed776688407e2798c156ce18630.exeC:\Users\Admin\AppData\Local\Temp\42cb5ed776688407e2798c156ce18630.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2872
-