Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 03:08
Behavioral task
behavioral1
Sample
0c837b8f6ca68ee32e0e7916a5731846.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c837b8f6ca68ee32e0e7916a5731846.exe
Resource
win10v2004-20231215-en
General
-
Target
0c837b8f6ca68ee32e0e7916a5731846.exe
-
Size
2.9MB
-
MD5
0c837b8f6ca68ee32e0e7916a5731846
-
SHA1
c139c7163f9fc39775d6b93e5aea8164e084cea8
-
SHA256
fb4049f1cbf38c779ee6dd169995f5b52e3f0fbbecdf91cc1988c7a874a22f20
-
SHA512
a9da09fa311a1d41f74a12e42fdaf0e4059fb4ad31edf374681c2b7c74f76ca374d696dd2c9adbcf5b6054c71a37b774e869ce35383277fde949a5f9c2d5949f
-
SSDEEP
49152:HD+tyDbS07WDZfbRET0C5g0pvpDMYFepN74NH5HUyNRcUsCVOzetdZJ:HDNbe1c0CmSpDMX4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4756 0c837b8f6ca68ee32e0e7916a5731846.exe -
Executes dropped EXE 1 IoCs
pid Process 4756 0c837b8f6ca68ee32e0e7916a5731846.exe -
resource yara_rule behavioral2/memory/3712-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/4756-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000300000002272c-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3712 0c837b8f6ca68ee32e0e7916a5731846.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3712 0c837b8f6ca68ee32e0e7916a5731846.exe 4756 0c837b8f6ca68ee32e0e7916a5731846.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3712 wrote to memory of 4756 3712 0c837b8f6ca68ee32e0e7916a5731846.exe 90 PID 3712 wrote to memory of 4756 3712 0c837b8f6ca68ee32e0e7916a5731846.exe 90 PID 3712 wrote to memory of 4756 3712 0c837b8f6ca68ee32e0e7916a5731846.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c837b8f6ca68ee32e0e7916a5731846.exe"C:\Users\Admin\AppData\Local\Temp\0c837b8f6ca68ee32e0e7916a5731846.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\0c837b8f6ca68ee32e0e7916a5731846.exeC:\Users\Admin\AppData\Local\Temp\0c837b8f6ca68ee32e0e7916a5731846.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4756
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5d95df9270c4576b1d650ce383e873f9f
SHA124597764821b99d3c1a5bc5e7f1faa7d8125b63f
SHA25687108f67891adb1f434c46a8d7f65aa2f2f2b9bacf0f5ed386783dcfd38d0dca
SHA512a66ea87d5382ff90e1b2da2bb93949b7ec195f958206aa10f12b2822886fe083a5fba37b06d8c90b1fd3b1231bac84fab7e29e5f7e0491229355c668545b2f9c