Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
f6532b9c86777b8d891fdf2537ee1ae1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f6532b9c86777b8d891fdf2537ee1ae1.exe
Resource
win10v2004-20231215-en
General
-
Target
f6532b9c86777b8d891fdf2537ee1ae1.exe
-
Size
105KB
-
MD5
f6532b9c86777b8d891fdf2537ee1ae1
-
SHA1
de2a36477ec2dd690ab866ffcf725cbc20e5021d
-
SHA256
a4922876ed703f061c0fada8bca98209a50484a8be1d10ebdce03ac1e11a6de4
-
SHA512
e729fb02023f143960815a61cdf3e9abcd1090862f37a59a0e4cdfa99b401077fc09621800984b850c4855a283c0b13a12677c1919ce9d42b48b5f58d1d09ed0
-
SSDEEP
1536:+EVdVtuJ2vkwCNl/7f+f/zPNdUIjkIw7NWLiTt6DtW9YH:tVdVtugYD+f/LNdHIp7epW9i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2384 f6532b9c86777b8d891fdf2537ee1ae1.exe -
Executes dropped EXE 1 IoCs
pid Process 2384 f6532b9c86777b8d891fdf2537ee1ae1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4076 f6532b9c86777b8d891fdf2537ee1ae1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4076 f6532b9c86777b8d891fdf2537ee1ae1.exe 2384 f6532b9c86777b8d891fdf2537ee1ae1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4076 wrote to memory of 2384 4076 f6532b9c86777b8d891fdf2537ee1ae1.exe 91 PID 4076 wrote to memory of 2384 4076 f6532b9c86777b8d891fdf2537ee1ae1.exe 91 PID 4076 wrote to memory of 2384 4076 f6532b9c86777b8d891fdf2537ee1ae1.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6532b9c86777b8d891fdf2537ee1ae1.exe"C:\Users\Admin\AppData\Local\Temp\f6532b9c86777b8d891fdf2537ee1ae1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\f6532b9c86777b8d891fdf2537ee1ae1.exeC:\Users\Admin\AppData\Local\Temp\f6532b9c86777b8d891fdf2537ee1ae1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2384
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5c09ae587ebd6b3e1a9d4525040dac243
SHA15c5a05f3ab13ffc1844fd2ca282b9a9a97678c9f
SHA2565c9a3acc63cae95582a7582627c4b0e94da052e4ec85295e3a96bce531aa5e89
SHA5120fee716db1cadea88c49843cff7f9e3004cd06fa064e832c883827ee8a73ecae631e86b484e06bc981c38aac098a48d6cd1aaab652cced2c4267e20383261a0c