Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
0a507beac5d39e037c6fc6e6884dbe7e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a507beac5d39e037c6fc6e6884dbe7e.exe
Resource
win10v2004-20231215-en
General
-
Target
0a507beac5d39e037c6fc6e6884dbe7e.exe
-
Size
82KB
-
MD5
0a507beac5d39e037c6fc6e6884dbe7e
-
SHA1
a0a8f6c6284a849fcad6bbcf09698c00caae2888
-
SHA256
ccb44d165559172aab45ec0fc037f4b48b123cc16c35241cc2963d4b6671613d
-
SHA512
7a696354dec01e79ff7a712786162bb05345ef35cdc400169a06800f74fbba64fd6fc819fb89a1a84bc6a62f0773f98e8c516a2c1d4d7b8e416d90195a846750
-
SSDEEP
1536:fjqQ/CAtqZYTHoS44+9YUBO4EskCZL+TSF14klYq5qhlUuKY:febIBTN44+meGifJBY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4272 0a507beac5d39e037c6fc6e6884dbe7e.exe -
Executes dropped EXE 1 IoCs
pid Process 4272 0a507beac5d39e037c6fc6e6884dbe7e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3820 0a507beac5d39e037c6fc6e6884dbe7e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3820 0a507beac5d39e037c6fc6e6884dbe7e.exe 4272 0a507beac5d39e037c6fc6e6884dbe7e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3820 wrote to memory of 4272 3820 0a507beac5d39e037c6fc6e6884dbe7e.exe 93 PID 3820 wrote to memory of 4272 3820 0a507beac5d39e037c6fc6e6884dbe7e.exe 93 PID 3820 wrote to memory of 4272 3820 0a507beac5d39e037c6fc6e6884dbe7e.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a507beac5d39e037c6fc6e6884dbe7e.exe"C:\Users\Admin\AppData\Local\Temp\0a507beac5d39e037c6fc6e6884dbe7e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\0a507beac5d39e037c6fc6e6884dbe7e.exeC:\Users\Admin\AppData\Local\Temp\0a507beac5d39e037c6fc6e6884dbe7e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4272
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD542ccb55a4fb501037424e91761f42443
SHA1ee6fc6dc831373cca91f2ac3b9b409b1964236f6
SHA256e53795390f23f64f00edeb4820b3844a50d6e8fcce0c889b19a43e5e3c5944bc
SHA51258ca3eccc00897ce928c6fb8d1498548a8bff05214aecc311f9b49a854b4fa9c163c5ffb9e501f3d69b7c2288479d4de38016f6f88ca3665137f362c1efdfa22