Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    158s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 02:32

General

  • Target

    0bc5e87ac979995aa21f50ff148bb0b2.exe

  • Size

    22KB

  • MD5

    0bc5e87ac979995aa21f50ff148bb0b2

  • SHA1

    7d93bb99610d5f0f0c40c206cc88f6d6fbceda3b

  • SHA256

    53f5c39d920bc028011e540a23f563e35a8fb1fb3eb8d94e6138874cefa81431

  • SHA512

    e236f4b6aad4d0e2e73f27eb9fe69d4eec36138ec9a818f15c8908c692acc46a9d075d770fdf6a6d8710b1cb800d4525fb4a5904e65f3abab5641d9d5102c497

  • SSDEEP

    384:bPGOXEqpmTwT/IcO8lBTexuDWRaRqGjcqIpBjEvXkSwea5Id2WDfQFkZ4cQnwqgS:bPlXiTwT/sxuqRryLweXx8FMRQn

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bc5e87ac979995aa21f50ff148bb0b2.exe
    "C:\Users\Admin\AppData\Local\Temp\0bc5e87ac979995aa21f50ff148bb0b2.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\Delme.bat
      2⤵
        PID:2008

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Delme.bat

      Filesize

      184B

      MD5

      e6c2809574897ae08d4188f3635f6857

      SHA1

      8559a70a1ee86f4c4f2f15db0a2ca7aa8b18529b

      SHA256

      2a344d6084a16b8d8c01138bdfa8ea8ed779caaa84c2c40bf2a6b85f2bbdd396

      SHA512

      19e45dee93e0fbcd8f63e26448a484ac146f3c3089d848124fa6bcfdc3e65fd44c92b8c46d237abe0286e72e63d1e04ab0f2d1af666dab093106b8ead85f7f7a

    • memory/3060-0-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/3060-5-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB