Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:12
Behavioral task
behavioral1
Sample
0e059d8f4b289782462a62a2934dd40f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e059d8f4b289782462a62a2934dd40f.exe
Resource
win10v2004-20231215-en
General
-
Target
0e059d8f4b289782462a62a2934dd40f.exe
-
Size
1.3MB
-
MD5
0e059d8f4b289782462a62a2934dd40f
-
SHA1
6acb92e1859af59c8ae51d591babed9959339009
-
SHA256
f620023ce9f5c1e11025c082605b74d2002097b7066b74078c197bed3f2aa844
-
SHA512
03311c5e56cddc4e75429a9560a4e433e06019b7056c3601bf2b56c9ac8029766b12fd0afbf6309940fc92bc4a2b0b68d867bfcdbd82f02a01ba954d9741396d
-
SSDEEP
24576:WTTp81+wq0ovizGhDw+Pi0GRMbEyNnZOFUi4kid6iYU9/9Us:WTTp81+wq0Dd0GRMbE02P4ldtHR9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3760 0e059d8f4b289782462a62a2934dd40f.exe -
Executes dropped EXE 1 IoCs
pid Process 3760 0e059d8f4b289782462a62a2934dd40f.exe -
resource yara_rule behavioral2/memory/3632-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000200000001fafe-11.dat upx behavioral2/memory/3760-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3632 0e059d8f4b289782462a62a2934dd40f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3632 0e059d8f4b289782462a62a2934dd40f.exe 3760 0e059d8f4b289782462a62a2934dd40f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3632 wrote to memory of 3760 3632 0e059d8f4b289782462a62a2934dd40f.exe 91 PID 3632 wrote to memory of 3760 3632 0e059d8f4b289782462a62a2934dd40f.exe 91 PID 3632 wrote to memory of 3760 3632 0e059d8f4b289782462a62a2934dd40f.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e059d8f4b289782462a62a2934dd40f.exe"C:\Users\Admin\AppData\Local\Temp\0e059d8f4b289782462a62a2934dd40f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\0e059d8f4b289782462a62a2934dd40f.exeC:\Users\Admin\AppData\Local\Temp\0e059d8f4b289782462a62a2934dd40f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3760
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD557e1df5232e6ea59c30027adb9f98e5b
SHA15102318ca0831bf45327f279014f9e8f5f4301e5
SHA256e878449fcc191079bb1844d3b11bed366b91ee17768b8fb50300d67aa48f0b4b
SHA51228de469f9c2835d98e75e9328687586a5d6b48278375b8963b23bed80ad0b3e4224eff04d6f774b373a63ec396251ffa3c1d4504b8e7b984c6cc2332dd44b6c8