Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 20:29
Behavioral task
behavioral1
Sample
f605b47e868a089a99ef140274d4800e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f605b47e868a089a99ef140274d4800e.exe
Resource
win10v2004-20231215-en
General
-
Target
f605b47e868a089a99ef140274d4800e.exe
-
Size
353KB
-
MD5
f605b47e868a089a99ef140274d4800e
-
SHA1
80d0a05b9a7d9d36f4001c6bace2ee29aeebef0e
-
SHA256
a312226482b7b8fa44e3827b2572b0ee58dbfe0d104f4b3a978f76ef36d6f357
-
SHA512
68a9e63a51c605989f8da2b633d2a65c026bb6ad5d9fa5478a17e569523ea31ac13af42c897a2800a65e111e4fd39ea7f4f1aecac0d5c14c402cbb5dfba09fe8
-
SSDEEP
6144:r6ksFVXy/DORL7oU4V5Ab0hpCAOpCfKvTPhX/CKAPCDJgEjjYdxfsLPrPwo+:r6kUC/DOlcVKb0aQSvf28JhXYTfmE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4116 f605b47e868a089a99ef140274d4800e.exe -
Executes dropped EXE 1 IoCs
pid Process 4116 f605b47e868a089a99ef140274d4800e.exe -
resource yara_rule behavioral2/memory/3312-0-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral2/files/0x0007000000023235-11.dat upx behavioral2/memory/4116-13-0x0000000000400000-0x00000000004F1000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3312 f605b47e868a089a99ef140274d4800e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3312 f605b47e868a089a99ef140274d4800e.exe 4116 f605b47e868a089a99ef140274d4800e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3312 wrote to memory of 4116 3312 f605b47e868a089a99ef140274d4800e.exe 91 PID 3312 wrote to memory of 4116 3312 f605b47e868a089a99ef140274d4800e.exe 91 PID 3312 wrote to memory of 4116 3312 f605b47e868a089a99ef140274d4800e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f605b47e868a089a99ef140274d4800e.exe"C:\Users\Admin\AppData\Local\Temp\f605b47e868a089a99ef140274d4800e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\f605b47e868a089a99ef140274d4800e.exeC:\Users\Admin\AppData\Local\Temp\f605b47e868a089a99ef140274d4800e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4116
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
353KB
MD5c55eaaf0828a2a70317390934e3564de
SHA13f802bee8fab31f34c76b3622d1efb24f5aafb3e
SHA256cdf1725160f85129fcd2e91cba1d6522fdc7afc99da52955498425873cd6475d
SHA5129b83534a25a8f3b973eb98709cb469c5207a7a856a7e5ad544a21ceb035510134b1d93e76f05188596096f8872e5f22f10c1fbb2ddac1cb6757ed7e8cce8c2db