Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 03:12
Behavioral task
behavioral1
Sample
0c9c8df12e60f1113ff133ebfdc9c4cc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c9c8df12e60f1113ff133ebfdc9c4cc.exe
Resource
win10v2004-20231215-en
General
-
Target
0c9c8df12e60f1113ff133ebfdc9c4cc.exe
-
Size
1.3MB
-
MD5
0c9c8df12e60f1113ff133ebfdc9c4cc
-
SHA1
0575f40a7ec59ab91c0a4410741c98e0c482c96b
-
SHA256
a6788d0ba5dc8c7940d38e3eb84e8d632659f9b7e2391e77d5ffb8098221c969
-
SHA512
cd97225bb9ddcb6ff60eef95e3a59a5bb265ef225fa331a7fb391f30f3d17e0a492217ce81117e4a5cd98d0bddc834112c58f11012bab812032d1e1f367d7a5d
-
SSDEEP
24576:qzy2Zrbh6AN+DRI1127mt43Okd4v+RdYJ92pw5JPnDTP9wKaeEB9rwdVAyGXn5YV:Ch7N+DReZPl+RDpwPfDTTaBz4Nj3f
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1480 0c9c8df12e60f1113ff133ebfdc9c4cc.exe -
Executes dropped EXE 1 IoCs
pid Process 1480 0c9c8df12e60f1113ff133ebfdc9c4cc.exe -
resource yara_rule behavioral2/memory/3308-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0006000000023219-11.dat upx behavioral2/memory/1480-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3308 0c9c8df12e60f1113ff133ebfdc9c4cc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3308 0c9c8df12e60f1113ff133ebfdc9c4cc.exe 1480 0c9c8df12e60f1113ff133ebfdc9c4cc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3308 wrote to memory of 1480 3308 0c9c8df12e60f1113ff133ebfdc9c4cc.exe 91 PID 3308 wrote to memory of 1480 3308 0c9c8df12e60f1113ff133ebfdc9c4cc.exe 91 PID 3308 wrote to memory of 1480 3308 0c9c8df12e60f1113ff133ebfdc9c4cc.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c9c8df12e60f1113ff133ebfdc9c4cc.exe"C:\Users\Admin\AppData\Local\Temp\0c9c8df12e60f1113ff133ebfdc9c4cc.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\0c9c8df12e60f1113ff133ebfdc9c4cc.exeC:\Users\Admin\AppData\Local\Temp\0c9c8df12e60f1113ff133ebfdc9c4cc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1480
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
496KB
MD572b726a5ebd4bdbb662ad7cf5fdfa197
SHA18ec3a48b2c04530361212c74ed0ea2ead096e7c4
SHA256ab59af898859de4c1fa7a5b27a5a8afeaa45fe196bb31895ffee63ead57ba697
SHA512ebfb3d9774e03c3a2c54df7090aedfc2ad639296bb9c263aefc45611a302f664e23a123a904b0dc1b1882f0d5b81e9fd97587c497eb73ee543b60b67aa3e0820