Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:34
Behavioral task
behavioral1
Sample
20296f558f2e1265e46148e742250e7f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
20296f558f2e1265e46148e742250e7f.exe
Resource
win10v2004-20231215-en
General
-
Target
20296f558f2e1265e46148e742250e7f.exe
-
Size
1.3MB
-
MD5
20296f558f2e1265e46148e742250e7f
-
SHA1
99bc12048fc780d30aaea5812b34dff2bf6254a3
-
SHA256
e24f3f247e560cc3f7cf04df04b1d1fc508b6b9525a95c79d4970ef7755e53b7
-
SHA512
23db94053384ea4b3ca533922c4df02f1ec65bdf6d235b0ae4d557615bf57b0db245705e8a47d29a66147ac4185441766522f40cbc75d40c5b45507723796c37
-
SSDEEP
24576:OuVSdZlDLxez0nuz0xbSkoasK8+C8zu5t5CajYmoqACoXzvG:03uzTN18zy5C4YaAl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3744 20296f558f2e1265e46148e742250e7f.exe -
Executes dropped EXE 1 IoCs
pid Process 3744 20296f558f2e1265e46148e742250e7f.exe -
resource yara_rule behavioral2/memory/2672-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x00080000000231ae-12.dat upx behavioral2/memory/3744-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2672 20296f558f2e1265e46148e742250e7f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2672 20296f558f2e1265e46148e742250e7f.exe 3744 20296f558f2e1265e46148e742250e7f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2672 wrote to memory of 3744 2672 20296f558f2e1265e46148e742250e7f.exe 85 PID 2672 wrote to memory of 3744 2672 20296f558f2e1265e46148e742250e7f.exe 85 PID 2672 wrote to memory of 3744 2672 20296f558f2e1265e46148e742250e7f.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\20296f558f2e1265e46148e742250e7f.exe"C:\Users\Admin\AppData\Local\Temp\20296f558f2e1265e46148e742250e7f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\20296f558f2e1265e46148e742250e7f.exeC:\Users\Admin\AppData\Local\Temp\20296f558f2e1265e46148e742250e7f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3744
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
581KB
MD5a5bd0ff464e2d4e6e2b6b1d7ca5de9db
SHA1ea62674c2b3807adab9e99d6fb4b1c13561e267f
SHA25640d54911606eb9a6b947099f2095a113bcd06500d53e17ca4133498a1308133b
SHA5120cb098240a5237cfa26fc12d84338bc73f55a010bdd2e7a38c1e1627ed8d8c0485c25a5125fcbeab7b65f64ed9f9bdea859456261bbe08529201c4a189b5ca69