Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 02:19
Behavioral task
behavioral1
Sample
4c48924269a6d9696b86b5fa6685ff71.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c48924269a6d9696b86b5fa6685ff71.exe
Resource
win10v2004-20231215-en
General
-
Target
4c48924269a6d9696b86b5fa6685ff71.exe
-
Size
420KB
-
MD5
4c48924269a6d9696b86b5fa6685ff71
-
SHA1
d2e8171d3090ef5f5a018fcddcd4e87f6610d6a7
-
SHA256
5d750bbac8bb5f7679c939b5eb4009083e8876b4318722b4ed199989efe5b49e
-
SHA512
2ec3865a8fa47e003648063fa3c873bda4cf5765539862393d22c5d8f2a30ad8964520c10915d67abde7e9e66ce3421288cb4f3ead3ca5cfe2a57af99bdfe443
-
SSDEEP
12288:ewaA3t7VPRw+8cOSQN2jyGFyFjISvfsJJa/oSdp:xpbw+8cze/jL4U7p
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4928-0-0x0000000000400000-0x0000000000602000-memory.dmp upx behavioral2/memory/4928-43-0x0000000000400000-0x0000000000602000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4928 4c48924269a6d9696b86b5fa6685ff71.exe 4928 4c48924269a6d9696b86b5fa6685ff71.exe 4928 4c48924269a6d9696b86b5fa6685ff71.exe 4928 4c48924269a6d9696b86b5fa6685ff71.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
865B
MD5e0a8deab4ac349f921506330849081dc
SHA1637f2edc1fae3e14681c8a7ce0befde91666ca99
SHA256d04ff52580db429f01e6ab276026f49dfdbf56ae277c0aac5f19b74d6a46511c
SHA512b46a0d6a84ace7b3778bf3d8e3c9e94420222d98a708b9ee87f0dc12028070c4da678786fcd8723e75c91fd33c9950cc8294abdee68e0854458bd902222c6336
-
Filesize
87KB
MD52290e78ddaffaa73838e9a67d679cbc7
SHA15e2583a2c5bad107c82cab2a495d559e1385ae41
SHA256ca6005b88259d61bfc9943b1236cd4f6f12833f3134a3c1553545247d95aca2d
SHA512a2c6ae503b264e30925c685efb6389175138fb809989d5e4c61e62345662c0d7a6e0de57c6a8f883209c7bf613c6be3fb4ca2031876d562271c8b111ad338abc