Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
47988d6b141bfcdf74da78c599f80977.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47988d6b141bfcdf74da78c599f80977.exe
Resource
win10v2004-20231215-en
General
-
Target
47988d6b141bfcdf74da78c599f80977.exe
-
Size
169KB
-
MD5
47988d6b141bfcdf74da78c599f80977
-
SHA1
d4e5ca28440ea73f5c03cf520fdf5c0efaecf49f
-
SHA256
1ebb874504be7c683e7064dadec0138d8835cbd6f2700a739afb8850b28cbaf3
-
SHA512
4a8c3b120ddaa69b803090805b0736c5f09dfe1a4f4aabbfa4f61b2317c4b2fdd359ce07ea0afd21a599c881203c4823118918bacdf962f829b71005e9f3e642
-
SSDEEP
3072:z5xJ5sydtOQQ5g7xfEF6cje/CbCvHz5LS74iE/cqopW9sz3GXZo0scMqF2DeP3mW:zJ5s8ti5gdEUcCamvl+4MY23GJo0scx5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 740 47988d6b141bfcdf74da78c599f80977.exe -
Executes dropped EXE 1 IoCs
pid Process 740 47988d6b141bfcdf74da78c599f80977.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4716 47988d6b141bfcdf74da78c599f80977.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4716 47988d6b141bfcdf74da78c599f80977.exe 740 47988d6b141bfcdf74da78c599f80977.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4716 wrote to memory of 740 4716 47988d6b141bfcdf74da78c599f80977.exe 89 PID 4716 wrote to memory of 740 4716 47988d6b141bfcdf74da78c599f80977.exe 89 PID 4716 wrote to memory of 740 4716 47988d6b141bfcdf74da78c599f80977.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\47988d6b141bfcdf74da78c599f80977.exe"C:\Users\Admin\AppData\Local\Temp\47988d6b141bfcdf74da78c599f80977.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\47988d6b141bfcdf74da78c599f80977.exeC:\Users\Admin\AppData\Local\Temp\47988d6b141bfcdf74da78c599f80977.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:740
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5b9e97fb7e4705185095f174c7a07f38f
SHA1191bfeddf6dbe583e5fce949451df33de19f4806
SHA256732774e6483c7ac7e99f6dc7de042f74640ab82e3c17f0faa857d8fe75271911
SHA5124be99b3fa8a8ffbc1f5b75c08fc352ac19f0d40cc8d861d210ad4b4d3889a7821d9241d2e675f6396aab7246b9e0584c44459109c2074a3021a97762c2a6d40f