Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 11:13
Behavioral task
behavioral1
Sample
19eb8274ae63acfa1be3c2ebe064d134.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
19eb8274ae63acfa1be3c2ebe064d134.exe
Resource
win10v2004-20231215-en
General
-
Target
19eb8274ae63acfa1be3c2ebe064d134.exe
-
Size
1.3MB
-
MD5
19eb8274ae63acfa1be3c2ebe064d134
-
SHA1
be091273b014c2cd2abe030a31640cbaf16c84ec
-
SHA256
af4c978866cf95e52785033bbf6f1ca6fb6237ef00cc67308c8b15d2fbfd9a64
-
SHA512
0057bd2098ad6f84dbaa6b0d1661c20b4224f8dfb927c6d0338d9821750120688525409ed6f00c90e3c5b0691d54453fea59ffaff4ec313645f5ade0f58c0f94
-
SSDEEP
24576:aca5eED/O+afxwvUSeRRJS/R34AvyGh1GnKyHRAdOY4bqRLvG:aHME0wUrUmAaGvQKkRAdT4G
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3488 19eb8274ae63acfa1be3c2ebe064d134.exe -
Executes dropped EXE 1 IoCs
pid Process 3488 19eb8274ae63acfa1be3c2ebe064d134.exe -
resource yara_rule behavioral2/memory/1764-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000300000001f45f-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1764 19eb8274ae63acfa1be3c2ebe064d134.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1764 19eb8274ae63acfa1be3c2ebe064d134.exe 3488 19eb8274ae63acfa1be3c2ebe064d134.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1764 wrote to memory of 3488 1764 19eb8274ae63acfa1be3c2ebe064d134.exe 28 PID 1764 wrote to memory of 3488 1764 19eb8274ae63acfa1be3c2ebe064d134.exe 28 PID 1764 wrote to memory of 3488 1764 19eb8274ae63acfa1be3c2ebe064d134.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\19eb8274ae63acfa1be3c2ebe064d134.exe"C:\Users\Admin\AppData\Local\Temp\19eb8274ae63acfa1be3c2ebe064d134.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\19eb8274ae63acfa1be3c2ebe064d134.exeC:\Users\Admin\AppData\Local\Temp\19eb8274ae63acfa1be3c2ebe064d134.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3488
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5447b91f1e80621ac7e68a992168be878
SHA1378eec9367bdffd6726cee56898dc44339a7bed0
SHA2566d25f95ba17d06dcc1243bddedbabd9da7f700563c9a6eee29683e616a6fcb6f
SHA51255edd7a1d431aea58282185b58d52ee95dec978e2e2ef17d9fed80bbed67c181c05a6d676e6c809375947b61c71967b502f0e9fde1bdfe30ab0ea6fe557beccc