Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 12:47
Static task
static1
Behavioral task
behavioral1
Sample
6f9f0a5b1f55e4c07030580c31206e41.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6f9f0a5b1f55e4c07030580c31206e41.exe
Resource
win10v2004-20231215-en
General
-
Target
6f9f0a5b1f55e4c07030580c31206e41.exe
-
Size
57KB
-
MD5
6f9f0a5b1f55e4c07030580c31206e41
-
SHA1
13fb059d26945f806ace95244061ae36fcaba1ff
-
SHA256
218a8b410132f605accdbf050f7e50a34d602a787386f035b28eaaa24775dfe8
-
SHA512
25aae7d8db468d43a5a5d5002befaea6bf6364f9a81a0a5531e3a64e4f009143820f7dbc99bfc6ff8e65fbc40c40d6fc4bb5ec136792102ba2b9a82d589178ab
-
SSDEEP
1536:qwzT9AgyEu6UzWyDBpkDmgY6dtr0/KHQgyVbQ:WgABCDmCtrB0Vs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1128 6f9f0a5b1f55e4c07030580c31206e41.exe -
Executes dropped EXE 1 IoCs
pid Process 1128 6f9f0a5b1f55e4c07030580c31206e41.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4168 6f9f0a5b1f55e4c07030580c31206e41.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4168 6f9f0a5b1f55e4c07030580c31206e41.exe 1128 6f9f0a5b1f55e4c07030580c31206e41.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4168 wrote to memory of 1128 4168 6f9f0a5b1f55e4c07030580c31206e41.exe 21 PID 4168 wrote to memory of 1128 4168 6f9f0a5b1f55e4c07030580c31206e41.exe 21 PID 4168 wrote to memory of 1128 4168 6f9f0a5b1f55e4c07030580c31206e41.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f9f0a5b1f55e4c07030580c31206e41.exe"C:\Users\Admin\AppData\Local\Temp\6f9f0a5b1f55e4c07030580c31206e41.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\6f9f0a5b1f55e4c07030580c31206e41.exeC:\Users\Admin\AppData\Local\Temp\6f9f0a5b1f55e4c07030580c31206e41.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1128
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5a45d9b87acb3912582b6dd0a7b0797b5
SHA13b49ff4ed0f1a9c7df1a473874fc387358e3da20
SHA256efdccebd499d01eabb332c98ab91c16a469b15d2d043366faff8f9fc2a7f1a2f
SHA51254be5d342dc8e3a7cc07278aad8325332a1810cf2ed08f4d3c9add8e6f1b877b7e391f23e5849562656a23e7a1b82dd7c80a959d894237219eb7b1d1d6cc5913