Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
0e565ef586e8276dd2409a740e024099.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e565ef586e8276dd2409a740e024099.exe
Resource
win10v2004-20231215-en
General
-
Target
0e565ef586e8276dd2409a740e024099.exe
-
Size
82KB
-
MD5
0e565ef586e8276dd2409a740e024099
-
SHA1
d6a1567d8d112fc2be7e916da966789935430bb8
-
SHA256
e38d1531995bc87e52aa74fca84ea4221a5abd88e3ebeef6f1a61658d1d251ce
-
SHA512
90c232659b0e81b3b3a61fd5cca8ecf0f7a370be9e91ba57de8b08c75e306cc2791ed27d207707538ab9c331c10dfa0a30d0eba2789531e844778d52ad36671c
-
SSDEEP
1536:M4sHS/44wlySEU4MbQOiIn77Lr2ZYOu+i/G7HQATdW8PZ8b3pao3MSpE7WlpOXnK:M4sy/lwlySEU7bQOiIn77Lr2aOuT/G7i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 928 0e565ef586e8276dd2409a740e024099.exe -
Executes dropped EXE 1 IoCs
pid Process 928 0e565ef586e8276dd2409a740e024099.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3560 0e565ef586e8276dd2409a740e024099.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3560 0e565ef586e8276dd2409a740e024099.exe 928 0e565ef586e8276dd2409a740e024099.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3560 wrote to memory of 928 3560 0e565ef586e8276dd2409a740e024099.exe 92 PID 3560 wrote to memory of 928 3560 0e565ef586e8276dd2409a740e024099.exe 92 PID 3560 wrote to memory of 928 3560 0e565ef586e8276dd2409a740e024099.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e565ef586e8276dd2409a740e024099.exe"C:\Users\Admin\AppData\Local\Temp\0e565ef586e8276dd2409a740e024099.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\0e565ef586e8276dd2409a740e024099.exeC:\Users\Admin\AppData\Local\Temp\0e565ef586e8276dd2409a740e024099.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:928
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD556cbf5773d6725061c1d8cfce6d7aafc
SHA13ea5050f2308f5438e9665fd9cc7a7753805d686
SHA256eb5f488d1b94e1182da505a5009e4ee5e66436be19ef9d58e49085556a1b55b8
SHA512eaa89c393375dfdf00694d5a1952eb0328fb957f7eb95b9704cadb4c9f0c099cd485a4e090ab9a558a1619fefbbb675e1dc775f2983509767edddf6dc2c89233