Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 21:54
Behavioral task
behavioral1
Sample
04ecfc627270e30979bbda808252cbe6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04ecfc627270e30979bbda808252cbe6.exe
Resource
win10v2004-20231215-en
General
-
Target
04ecfc627270e30979bbda808252cbe6.exe
-
Size
2.9MB
-
MD5
04ecfc627270e30979bbda808252cbe6
-
SHA1
d27fe3576cdb9766773039d5fadb3b8a2e8d402c
-
SHA256
50385d9912fca398c568147f5103b1436f433216f6f896395bbd664e1fc293e6
-
SHA512
d64127cffe41c251c8a6c7456d0abd4c4986175566f54f3f3ed9498df69e6f3aa7c6842ea02543305edd96f5281920af83175d26dc602ecdf5318dcbb9facd9b
-
SSDEEP
49152:Ivb3VJZZgvs5dBvs0mgP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:Ivb3VJUs5dBTmggg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1664 04ecfc627270e30979bbda808252cbe6.exe -
Executes dropped EXE 1 IoCs
pid Process 1664 04ecfc627270e30979bbda808252cbe6.exe -
resource yara_rule behavioral2/memory/568-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000d00000002315f-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 568 04ecfc627270e30979bbda808252cbe6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 568 04ecfc627270e30979bbda808252cbe6.exe 1664 04ecfc627270e30979bbda808252cbe6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 568 wrote to memory of 1664 568 04ecfc627270e30979bbda808252cbe6.exe 92 PID 568 wrote to memory of 1664 568 04ecfc627270e30979bbda808252cbe6.exe 92 PID 568 wrote to memory of 1664 568 04ecfc627270e30979bbda808252cbe6.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\04ecfc627270e30979bbda808252cbe6.exe"C:\Users\Admin\AppData\Local\Temp\04ecfc627270e30979bbda808252cbe6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\04ecfc627270e30979bbda808252cbe6.exeC:\Users\Admin\AppData\Local\Temp\04ecfc627270e30979bbda808252cbe6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1664
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD56efd2ab684afdadcebb35c40527abcca
SHA10abae7c152b4e862e2c60a348bccfa0df8c35df0
SHA256f19f0a49288682cadd07207f79b6dd9f9ee23da164daf2002d5e3a9495fd8206
SHA512b037b21a42d21ecaf2a000239af647b46ccbf1ba764855761e14b19a8d7eb0b2f1ce6bac64dd58b45edf43cc0cd235d0003e2481a138e4e126afe1d96ce5a74c