Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:14
Behavioral task
behavioral1
Sample
09bf15384202a74d1df984892ef18a47.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09bf15384202a74d1df984892ef18a47.exe
Resource
win10v2004-20231215-en
General
-
Target
09bf15384202a74d1df984892ef18a47.exe
-
Size
1.3MB
-
MD5
09bf15384202a74d1df984892ef18a47
-
SHA1
e6a3ffe9ad836640b7c93dfab6f874755942c643
-
SHA256
30cb4cf59123f3be7d8c357307d5347361794c0bb9f5aefe3ccc34950187cdcd
-
SHA512
27aa5bff7e45bfc035792e0597285eff42c3b53fbdf38e730f2f96fc5ecf53c6f55b78dc80eceef306c1c51d908b7a7ba4d422fd96f9ba27c2fcdcb2aa3e749a
-
SSDEEP
24576:YOm9r/kgDB57/WZDkTa+lgzQPB8JgHrfMMwfl9jvLwk2vAWuU9/9Us:YO0/kgDL/n+wgzQp8gHr2l9jkkZWBR9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2052 09bf15384202a74d1df984892ef18a47.exe -
Executes dropped EXE 1 IoCs
pid Process 2052 09bf15384202a74d1df984892ef18a47.exe -
resource yara_rule behavioral2/memory/4604-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000400000001f274-11.dat upx behavioral2/memory/2052-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4604 09bf15384202a74d1df984892ef18a47.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4604 09bf15384202a74d1df984892ef18a47.exe 2052 09bf15384202a74d1df984892ef18a47.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4604 wrote to memory of 2052 4604 09bf15384202a74d1df984892ef18a47.exe 89 PID 4604 wrote to memory of 2052 4604 09bf15384202a74d1df984892ef18a47.exe 89 PID 4604 wrote to memory of 2052 4604 09bf15384202a74d1df984892ef18a47.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\09bf15384202a74d1df984892ef18a47.exe"C:\Users\Admin\AppData\Local\Temp\09bf15384202a74d1df984892ef18a47.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\09bf15384202a74d1df984892ef18a47.exeC:\Users\Admin\AppData\Local\Temp\09bf15384202a74d1df984892ef18a47.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2052
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD52663d9e0c970887f4b62b499d6a315be
SHA1a7f89d7a6e14251a36bb3017aad8ead57d3cacb8
SHA256e775be7a0f92ea701320fdd756608b9573a384384acce4183e3aea7d63c848e8
SHA512aabdf7d81bacc0ad70ff0dcd8df1250ec563f4563297dbba4f949b8801512b50b5ccc76de65c4d736121cd86bbebac7ae9fd4f80d17dabdd7ecaa1ef85776fe0