Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 06:31
Static task
static1
Behavioral task
behavioral1
Sample
59c122b9a38d1ca7849b7475a636b2b9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59c122b9a38d1ca7849b7475a636b2b9.exe
Resource
win10v2004-20231222-en
General
-
Target
59c122b9a38d1ca7849b7475a636b2b9.exe
-
Size
200KB
-
MD5
59c122b9a38d1ca7849b7475a636b2b9
-
SHA1
904fc47ca8993129240222c691094538dcab0636
-
SHA256
83ec4fea7725a549d0b51f38b074623f39da3de5a9caf2b866664d0de60a5e52
-
SHA512
413e8bc089b98c74d75fe8a96d1af96f9fc42db43f7c0f056b1cdd2f363d83efbf472bf9e6f1dd42bd3c2b4e7b4bd7098dd41ba80aa91a2e07db5e5a4b429ed1
-
SSDEEP
6144:vL79OHITAvFv9xRv0rCSc4ONSai/fF3AKYpns:D79Ornp0OA7L/FAbs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2012 59c122b9a38d1ca7849b7475a636b2b9.exe -
Executes dropped EXE 1 IoCs
pid Process 2012 59c122b9a38d1ca7849b7475a636b2b9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3732 59c122b9a38d1ca7849b7475a636b2b9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3732 59c122b9a38d1ca7849b7475a636b2b9.exe 2012 59c122b9a38d1ca7849b7475a636b2b9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3732 wrote to memory of 2012 3732 59c122b9a38d1ca7849b7475a636b2b9.exe 18 PID 3732 wrote to memory of 2012 3732 59c122b9a38d1ca7849b7475a636b2b9.exe 18 PID 3732 wrote to memory of 2012 3732 59c122b9a38d1ca7849b7475a636b2b9.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\59c122b9a38d1ca7849b7475a636b2b9.exeC:\Users\Admin\AppData\Local\Temp\59c122b9a38d1ca7849b7475a636b2b9.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2012
-
C:\Users\Admin\AppData\Local\Temp\59c122b9a38d1ca7849b7475a636b2b9.exe"C:\Users\Admin\AppData\Local\Temp\59c122b9a38d1ca7849b7475a636b2b9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3732
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD59e745ebef83e667ae0c8be00afdd9d72
SHA1a100cb448942ef068ae4e6153ae4e0649d993ec6
SHA256de2ae1ed89817a8e9491aea95ac9949a5587024b7e5c7b8c1f54e35c4b6661c0
SHA512764531b11d794f8b4ecfbeadfab851795b35b14dad2023095c70f07c1f455bbe0df187398ce77e7654258052496b20bc8c0dbb314655beb789c7e4109abd8735