Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 21:48
Behavioral task
behavioral1
Sample
04d211625088ef6fd911ab9ab697c1f4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04d211625088ef6fd911ab9ab697c1f4.exe
Resource
win10v2004-20231222-en
General
-
Target
04d211625088ef6fd911ab9ab697c1f4.exe
-
Size
5.3MB
-
MD5
04d211625088ef6fd911ab9ab697c1f4
-
SHA1
a795b5932809d2493c616305d5c01699c0d73747
-
SHA256
2d809cb4678744ada9e0284937f471019d4ff817c1184b9d485956266ab642b3
-
SHA512
aa9be806efcffd268273ff5de710d52527acd42729f9042617f64f2f675eb34e7738fca4934fc0e147c6437e930f0a8c3d6d1c95226ce685b2a35288e5c26b10
-
SSDEEP
98304:0MUC2KFRfehHyehoFV39zJxxYc+Ug0HtTU6eHFr92S0RNHyehoFV39zJxxYc+Ugc:j2OmS139zJxxYcjnelrwS0RNS139zJxr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1880 04d211625088ef6fd911ab9ab697c1f4.exe -
Executes dropped EXE 1 IoCs
pid Process 1880 04d211625088ef6fd911ab9ab697c1f4.exe -
resource yara_rule behavioral2/files/0x000700000002324a-11.dat upx behavioral2/memory/1880-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/memory/2204-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2204 04d211625088ef6fd911ab9ab697c1f4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2204 04d211625088ef6fd911ab9ab697c1f4.exe 1880 04d211625088ef6fd911ab9ab697c1f4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1880 2204 04d211625088ef6fd911ab9ab697c1f4.exe 21 PID 2204 wrote to memory of 1880 2204 04d211625088ef6fd911ab9ab697c1f4.exe 21 PID 2204 wrote to memory of 1880 2204 04d211625088ef6fd911ab9ab697c1f4.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\04d211625088ef6fd911ab9ab697c1f4.exe"C:\Users\Admin\AppData\Local\Temp\04d211625088ef6fd911ab9ab697c1f4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\04d211625088ef6fd911ab9ab697c1f4.exeC:\Users\Admin\AppData\Local\Temp\04d211625088ef6fd911ab9ab697c1f4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1880
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD53468f78d32328c81eadb29f5f39661c9
SHA112ec4950d5955312ebe5eb448932cab807cd4424
SHA2568d3a20c4a2e0ac834b04ecf2e7a84ae8a2ad85b505bb92602f6b480a289f27d9
SHA5122fde8c259f9c829e600195609f7c5e4811fdda28a666deca4ed2a3e1fb93e0dda2f99c923d999ffc5b2370101c18356c2de934e958702f48760dfa70febf8a55