Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 02:24
Behavioral task
behavioral1
Sample
4c7dc06d56c085a36cf50431de28813a.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
4c7dc06d56c085a36cf50431de28813a.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
4c7dc06d56c085a36cf50431de28813a.exe
-
Size
68KB
-
MD5
4c7dc06d56c085a36cf50431de28813a
-
SHA1
72f1e251653f43c9e5f6846d4523f6fdbb47e5e1
-
SHA256
3ec1eb05f285a64217bc1f83ecafbdf4d2ef62fe7e37f083f1b192bc440ee098
-
SHA512
31605344e0c783509e4c3f39d9a6a496cf3a6531353965288c1ab82df93b658567442220074d23598c8d906ea49fa5da2eaf6a81e6c0047696c21af8ff5c4554
-
SSDEEP
1536:7TL6MWAfIaSVD4JXQJfXUXQFbKjTTgLvbe2r3ikerxFaiV0CmuJdr:zg+SVfsAFbKjTTgLvbrjpmgyBbdr
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3092 4c7dc06d56c085a36cf50431de28813a.exe -
Executes dropped EXE 1 IoCs
pid Process 3092 4c7dc06d56c085a36cf50431de28813a.exe -
resource yara_rule behavioral2/memory/1196-0-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1196 4c7dc06d56c085a36cf50431de28813a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1196 4c7dc06d56c085a36cf50431de28813a.exe 3092 4c7dc06d56c085a36cf50431de28813a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1196 wrote to memory of 3092 1196 4c7dc06d56c085a36cf50431de28813a.exe 19 PID 1196 wrote to memory of 3092 1196 4c7dc06d56c085a36cf50431de28813a.exe 19 PID 1196 wrote to memory of 3092 1196 4c7dc06d56c085a36cf50431de28813a.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c7dc06d56c085a36cf50431de28813a.exe"C:\Users\Admin\AppData\Local\Temp\4c7dc06d56c085a36cf50431de28813a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\4c7dc06d56c085a36cf50431de28813a.exeC:\Users\Admin\AppData\Local\Temp\4c7dc06d56c085a36cf50431de28813a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3092
-