Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 22:37
Behavioral task
behavioral1
Sample
1eafce42fe6cd6b4c7e091432e8f287c.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1eafce42fe6cd6b4c7e091432e8f287c.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
1eafce42fe6cd6b4c7e091432e8f287c.exe
-
Size
1.3MB
-
MD5
1eafce42fe6cd6b4c7e091432e8f287c
-
SHA1
a26206595b4746beed0dff1220355ca3e11100d6
-
SHA256
84807a64117e1f5ed93a6f41f16db800bf3d146037d05926f8b999d473c2256e
-
SHA512
da3fc9fd492db8c6e153053568fcb9fb33db18f041ed255aa8c5cb25e20a4cfa57441a57d073d18162fd444b86084ab78fb434b12ab45d129a6bb535612b3119
-
SSDEEP
24576:YgbCTJNYQizjTEUgnt/vVyR0a9KjfleUTIbdS9fh18JvG:YgbCTb/wjpA/vVyaaEfUGI5S9fg
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5076 1eafce42fe6cd6b4c7e091432e8f287c.exe -
Executes dropped EXE 1 IoCs
pid Process 5076 1eafce42fe6cd6b4c7e091432e8f287c.exe -
resource yara_rule behavioral2/memory/5076-14-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/1144-0-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1144 1eafce42fe6cd6b4c7e091432e8f287c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1144 1eafce42fe6cd6b4c7e091432e8f287c.exe 5076 1eafce42fe6cd6b4c7e091432e8f287c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1144 wrote to memory of 5076 1144 1eafce42fe6cd6b4c7e091432e8f287c.exe 16 PID 1144 wrote to memory of 5076 1144 1eafce42fe6cd6b4c7e091432e8f287c.exe 16 PID 1144 wrote to memory of 5076 1144 1eafce42fe6cd6b4c7e091432e8f287c.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eafce42fe6cd6b4c7e091432e8f287c.exe"C:\Users\Admin\AppData\Local\Temp\1eafce42fe6cd6b4c7e091432e8f287c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\1eafce42fe6cd6b4c7e091432e8f287c.exeC:\Users\Admin\AppData\Local\Temp\1eafce42fe6cd6b4c7e091432e8f287c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5076
-