Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0ac6c2ee92653a020841ddd40ab0b176.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
0ac6c2ee92653a020841ddd40ab0b176.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
0ac6c2ee92653a020841ddd40ab0b176.exe
-
Size
385KB
-
MD5
0ac6c2ee92653a020841ddd40ab0b176
-
SHA1
234fec850b3e6f0ba02ec04eac4d003d9e5d91a4
-
SHA256
becc403df0301e6b6dbf49f01aff24fd0b8a93cc3f62c4f6294a3bbf6a3ee010
-
SHA512
8430f3336414f807a046b460474d3e1e7103105ba55d8082ef13c9bfd90e744c8aa594231eb6823a79f7ff8fd92aef49a4fcaf88bb9466f7dc4ec149e25dfb04
-
SSDEEP
12288:NcAJZkZfVcPxJspYPmF/FzlcnJxQz2rD5YWfQv+i9veB:NcGZAcnm9gnPQyr9YWfK9GB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2952 0ac6c2ee92653a020841ddd40ab0b176.exe -
Executes dropped EXE 1 IoCs
pid Process 2952 0ac6c2ee92653a020841ddd40ab0b176.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3016 0ac6c2ee92653a020841ddd40ab0b176.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3016 0ac6c2ee92653a020841ddd40ab0b176.exe 2952 0ac6c2ee92653a020841ddd40ab0b176.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2952 3016 0ac6c2ee92653a020841ddd40ab0b176.exe 15 PID 3016 wrote to memory of 2952 3016 0ac6c2ee92653a020841ddd40ab0b176.exe 15 PID 3016 wrote to memory of 2952 3016 0ac6c2ee92653a020841ddd40ab0b176.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ac6c2ee92653a020841ddd40ab0b176.exe"C:\Users\Admin\AppData\Local\Temp\0ac6c2ee92653a020841ddd40ab0b176.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\0ac6c2ee92653a020841ddd40ab0b176.exeC:\Users\Admin\AppData\Local\Temp\0ac6c2ee92653a020841ddd40ab0b176.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2952
-