Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
170s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
1396ea34aba739cc19313db5366a7efd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1396ea34aba739cc19313db5366a7efd.exe
Resource
win10v2004-20231215-en
General
-
Target
1396ea34aba739cc19313db5366a7efd.exe
-
Size
165KB
-
MD5
1396ea34aba739cc19313db5366a7efd
-
SHA1
e0e8c17b3d60f58c98089fc67f4148f57d47a14b
-
SHA256
8dcb0ddbbd5691155e6e382ca187feec1cdc040f1950d0fcceeba35915c87e9c
-
SHA512
8af07376ab02d9fb0e42723f1fd73eed0b7cf67365f8b6ed7ae2a2b02994883dd1be0ca56471b0b7bc35bf86db964e67d793d5a36843a50941fe6ed878435323
-
SSDEEP
3072:0Y/d0oIFdigXh0RwhvFS05268nzAfhHDn+lRJSI5l9Mg/RuZrsnagYnTdEV:00WNfCwhvn5268nzA5HDneTSI5la+9sy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2912 1396ea34aba739cc19313db5366a7efd.exe -
Executes dropped EXE 1 IoCs
pid Process 2912 1396ea34aba739cc19313db5366a7efd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1540 1396ea34aba739cc19313db5366a7efd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1540 1396ea34aba739cc19313db5366a7efd.exe 2912 1396ea34aba739cc19313db5366a7efd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2912 1540 1396ea34aba739cc19313db5366a7efd.exe 92 PID 1540 wrote to memory of 2912 1540 1396ea34aba739cc19313db5366a7efd.exe 92 PID 1540 wrote to memory of 2912 1540 1396ea34aba739cc19313db5366a7efd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1396ea34aba739cc19313db5366a7efd.exe"C:\Users\Admin\AppData\Local\Temp\1396ea34aba739cc19313db5366a7efd.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\1396ea34aba739cc19313db5366a7efd.exeC:\Users\Admin\AppData\Local\Temp\1396ea34aba739cc19313db5366a7efd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2912
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD516cedcca64688c4ffafd7c15ca61c3c8
SHA19bb5f837eb6e6fdad5191f29a78623b5323e63ce
SHA256478e0c9393cacb2ebd7760de8a2d1736944cdb831089ef160ab80f798b7d951a
SHA51273caadb056d77f9ce55f422a13c6c1b38b41a867b1d410fc17612937ddc35ade91d10066b261e472b13c18395858c5c6ee0a2d2bdad63262ece8b61714a6da1d