Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 21:16
Behavioral task
behavioral1
Sample
f8aa70476b8f0bd64078e92b9fe25943.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f8aa70476b8f0bd64078e92b9fe25943.exe
Resource
win10v2004-20231215-en
General
-
Target
f8aa70476b8f0bd64078e92b9fe25943.exe
-
Size
56KB
-
MD5
f8aa70476b8f0bd64078e92b9fe25943
-
SHA1
e9a172cb77659e473ae0878616f2ceefb68298e8
-
SHA256
be1ab208727be6391c66bdd7c6e9710a51b83960212bf4e34f15b7017a95a95c
-
SHA512
3e2fe89c125bfef38a72102c2b607aed530ddc07b08e0c5932eeea52aa398454fb9401d5eca32d8cb1eb4d60d034f9b1cc6bd56cfee3d638a59a95cfa89e030d
-
SSDEEP
768:vykY1WhABIYwbIJdtGQ4jSEUbqoQaZI3ipiUn4mLhvh97j/QkSEE0dOi9B3oH:vQ0ABbgIJdcjSVeBhWDn4w7jgJi9B3e
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2984 f8aa70476b8f0bd64078e92b9fe25943.exe -
Executes dropped EXE 1 IoCs
pid Process 2984 f8aa70476b8f0bd64078e92b9fe25943.exe -
resource yara_rule behavioral2/memory/1116-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/2984-13-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0007000000023202-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1116 f8aa70476b8f0bd64078e92b9fe25943.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1116 f8aa70476b8f0bd64078e92b9fe25943.exe 2984 f8aa70476b8f0bd64078e92b9fe25943.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1116 wrote to memory of 2984 1116 f8aa70476b8f0bd64078e92b9fe25943.exe 90 PID 1116 wrote to memory of 2984 1116 f8aa70476b8f0bd64078e92b9fe25943.exe 90 PID 1116 wrote to memory of 2984 1116 f8aa70476b8f0bd64078e92b9fe25943.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8aa70476b8f0bd64078e92b9fe25943.exe"C:\Users\Admin\AppData\Local\Temp\f8aa70476b8f0bd64078e92b9fe25943.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\f8aa70476b8f0bd64078e92b9fe25943.exeC:\Users\Admin\AppData\Local\Temp\f8aa70476b8f0bd64078e92b9fe25943.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2984
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD57354a5a64480234fa6b0b7dd7aa95f61
SHA1f97cc8d6d124eb50c4d9d99cd478d2d60a76ccd3
SHA256daa600ed9d634943be313af8d9d513ce68d5d35e249812512af803234b05fcb7
SHA512104a81c0be0966188f0e3cc5294f827498b94e5c744e38aacc5d9be753f5530edbafdbd2c7f50e3e696ea6b1c5d2111df26814186076c662d74928c4a86de745