Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
5d6ce35a1c2db1d5777b4190f13d6889.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5d6ce35a1c2db1d5777b4190f13d6889.exe
Resource
win10v2004-20231215-en
General
-
Target
5d6ce35a1c2db1d5777b4190f13d6889.exe
-
Size
82KB
-
MD5
5d6ce35a1c2db1d5777b4190f13d6889
-
SHA1
7cb214de1e600ff1948976702d8f46961e1c3635
-
SHA256
dc59d7dbf3156d1dde3be50d50bf5538b2d36337fb78790f6adf4e63fc35eede
-
SHA512
0420a59225082f3dadd5cf2abd5ed149ff7b5340a483aa10c14859098bb6f06bdbc45947d965f58fecbc072153cd3f79a68d1743e6d13d9ec0da25e417c8f83c
-
SSDEEP
1536:xzRf1WODfKweiw7fHPOo0kS4nabYHakr73OLJoMl:MODihjPN0DulHvn3uuS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1020 5d6ce35a1c2db1d5777b4190f13d6889.exe -
Executes dropped EXE 1 IoCs
pid Process 1020 5d6ce35a1c2db1d5777b4190f13d6889.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4748 5d6ce35a1c2db1d5777b4190f13d6889.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4748 5d6ce35a1c2db1d5777b4190f13d6889.exe 1020 5d6ce35a1c2db1d5777b4190f13d6889.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4748 wrote to memory of 1020 4748 5d6ce35a1c2db1d5777b4190f13d6889.exe 91 PID 4748 wrote to memory of 1020 4748 5d6ce35a1c2db1d5777b4190f13d6889.exe 91 PID 4748 wrote to memory of 1020 4748 5d6ce35a1c2db1d5777b4190f13d6889.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d6ce35a1c2db1d5777b4190f13d6889.exe"C:\Users\Admin\AppData\Local\Temp\5d6ce35a1c2db1d5777b4190f13d6889.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\5d6ce35a1c2db1d5777b4190f13d6889.exeC:\Users\Admin\AppData\Local\Temp\5d6ce35a1c2db1d5777b4190f13d6889.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD560bad188362bdc878d9552411a3b005f
SHA15a058bfa722688bcb5225cc4b6f322c4999c3a4f
SHA256073d9370bc9ddf5cc649a38819e19bbbf17ba767fcb7fc5a4c0fa9b39e4fc18d
SHA51218c4d494d8f3caccf981734e38f97b4809b3d7bd1bc38c4cf8fc03288898c07c07fcaff3c4c9fda5a4d6d2f218abd311cbf6b94f3677370e788c4222e08faa97