Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 19:27
Behavioral task
behavioral1
Sample
01b210320422d9bf04f2bba90a1726d6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01b210320422d9bf04f2bba90a1726d6.exe
Resource
win10v2004-20231215-en
General
-
Target
01b210320422d9bf04f2bba90a1726d6.exe
-
Size
2.7MB
-
MD5
01b210320422d9bf04f2bba90a1726d6
-
SHA1
8eb031852fb1ae4928b68db0f579840533b3b219
-
SHA256
5fcc3f7143e906f8c4ca5dd9535d1b3c67a9169f3a963c5c44d9fc3bde83d57f
-
SHA512
289ad05ac133274adf2ec39ad1a26fee608ac8e19c0d70fb2939e36cc464ecdcee6582aba798535d1494787875dfea1752059267d46feb28f102392439a4ee67
-
SSDEEP
49152:iuyAVsuoIdZAkhP4LtUzyahjeR9gt0/p4dBRAzhRITJTNx26LGjR9j:NyAVmqZZStayahjeHg+/Gd0hQJTxLsHj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4536 01b210320422d9bf04f2bba90a1726d6.exe -
Executes dropped EXE 1 IoCs
pid Process 4536 01b210320422d9bf04f2bba90a1726d6.exe -
resource yara_rule behavioral2/memory/3660-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000400000001e716-11.dat upx behavioral2/memory/4536-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3660 01b210320422d9bf04f2bba90a1726d6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3660 01b210320422d9bf04f2bba90a1726d6.exe 4536 01b210320422d9bf04f2bba90a1726d6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3660 wrote to memory of 4536 3660 01b210320422d9bf04f2bba90a1726d6.exe 88 PID 3660 wrote to memory of 4536 3660 01b210320422d9bf04f2bba90a1726d6.exe 88 PID 3660 wrote to memory of 4536 3660 01b210320422d9bf04f2bba90a1726d6.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\01b210320422d9bf04f2bba90a1726d6.exe"C:\Users\Admin\AppData\Local\Temp\01b210320422d9bf04f2bba90a1726d6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\01b210320422d9bf04f2bba90a1726d6.exeC:\Users\Admin\AppData\Local\Temp\01b210320422d9bf04f2bba90a1726d6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4536
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
797KB
MD5bc26da3049fb39dad77e0ece9666592e
SHA179155e014a2ed0ac797350ecd6ec8399d227892d
SHA256e40c06f2a5ebca9a877b3505016ffcb977cfa9d61cb0d6fbbcb1d05bc548ff46
SHA51207931cb12af2c037d4f922aec1c290927fcaea84098b6f73f5599cc50496279ba27c485d01b47f6cd5b752bfb78c49c691e5cd990c754918fb0177a6a12f8c7b