Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 20:01

General

  • Target

    027cc29a378169652257d69e7254c5f2.exe

  • Size

    2.9MB

  • MD5

    027cc29a378169652257d69e7254c5f2

  • SHA1

    e9939e3b4462bef4a1a56b2d06dbedab80223ced

  • SHA256

    e68141124685d932e5b77bb3b0740ca414689243b533e5ffe8dae31165da4cde

  • SHA512

    bde92b09fba874548a33b97e660d6d862bd404b503965b74555bda886911d348f6b58952b76fc4711a69ca7780d8f43f0464d00472fd70ec4be6d2e7a1b7de30

  • SSDEEP

    49152:dOFj3o9byZnteaU3GyNHZyJ8yct0QbN74NH5HUyNRcUsCVOzetdZJ:dG3o0tHUtN5y2tL4HBUCczzM3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\027cc29a378169652257d69e7254c5f2.exe
    "C:\Users\Admin\AppData\Local\Temp\027cc29a378169652257d69e7254c5f2.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3952
    • C:\Users\Admin\AppData\Local\Temp\027cc29a378169652257d69e7254c5f2.exe
      C:\Users\Admin\AppData\Local\Temp\027cc29a378169652257d69e7254c5f2.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1472

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\027cc29a378169652257d69e7254c5f2.exe

    Filesize

    84KB

    MD5

    bb8ab90f25c3ccbd8f67d7346fb4906d

    SHA1

    b4e2d17309b9b4962d2685ae21a805a48d9194fc

    SHA256

    586b5622d373eaf9e38627834535427765b3026599ca8799f1aee53f7b496003

    SHA512

    d369810106986caf6e1db15d996e79013ecf5670fa8c9ae7471bf9eebb3471cfe8028476fe1483930706bae87bfce8bd24eb5ecd07bfbb49fcd2cec23059a0d9

  • memory/1472-14-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/1472-16-0x0000000001C80000-0x0000000001DB3000-memory.dmp

    Filesize

    1.2MB

  • memory/1472-13-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/1472-20-0x0000000005580000-0x00000000057AA000-memory.dmp

    Filesize

    2.2MB

  • memory/1472-21-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/1472-29-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/3952-0-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/3952-1-0x0000000001CE0000-0x0000000001E13000-memory.dmp

    Filesize

    1.2MB

  • memory/3952-2-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/3952-28-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB