Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
1d1a6778eb52658757ea5c1a6be70ac3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1d1a6778eb52658757ea5c1a6be70ac3.exe
Resource
win10v2004-20231222-en
General
-
Target
1d1a6778eb52658757ea5c1a6be70ac3.exe
-
Size
82KB
-
MD5
1d1a6778eb52658757ea5c1a6be70ac3
-
SHA1
015fd0d6fc02bccc47aae67c32d93efe9aedd9a6
-
SHA256
68c622a65f1d5265129b491c252b885bcf9764615d1db0f9ab04f7e6ccaa24dd
-
SHA512
887cecfcbe13df3785b54c241bab17db62ea692b900efdcd890a8060d9e452a9f772e570e42f1235efef054a04b00a98f492f0e11f8f201d7b9381ffdc5042c0
-
SSDEEP
1536:SskoZ6dqUPZlz5oqTmlBNaqZs9OJVVrGYgHTHtT:SHoQvZld/GVBy5HB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3632 1d1a6778eb52658757ea5c1a6be70ac3.exe -
Executes dropped EXE 1 IoCs
pid Process 3632 1d1a6778eb52658757ea5c1a6be70ac3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4312 1d1a6778eb52658757ea5c1a6be70ac3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4312 1d1a6778eb52658757ea5c1a6be70ac3.exe 3632 1d1a6778eb52658757ea5c1a6be70ac3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4312 wrote to memory of 3632 4312 1d1a6778eb52658757ea5c1a6be70ac3.exe 22 PID 4312 wrote to memory of 3632 4312 1d1a6778eb52658757ea5c1a6be70ac3.exe 22 PID 4312 wrote to memory of 3632 4312 1d1a6778eb52658757ea5c1a6be70ac3.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d1a6778eb52658757ea5c1a6be70ac3.exe"C:\Users\Admin\AppData\Local\Temp\1d1a6778eb52658757ea5c1a6be70ac3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\1d1a6778eb52658757ea5c1a6be70ac3.exeC:\Users\Admin\AppData\Local\Temp\1d1a6778eb52658757ea5c1a6be70ac3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3632
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5c387bcdf1a452a0919e06d5262404d0f
SHA1d729d9935975c59a760a59b94b00db90bd63d59a
SHA256afc55506b6db3007255133e1348e8354f4982cccebc6c3e492a0b2b2cb9fb588
SHA51294068705f476e880a32f204c2e36560be0f2643a1f23c4907980948067880dd873a4df7306c7163e29f0cb12194e7ad04f0c25170c70a16e6c340256e9d80419