Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
17b68a0f34217caa05c8f78d44a21291.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17b68a0f34217caa05c8f78d44a21291.exe
Resource
win10v2004-20231215-en
General
-
Target
17b68a0f34217caa05c8f78d44a21291.exe
-
Size
82KB
-
MD5
17b68a0f34217caa05c8f78d44a21291
-
SHA1
010e5f9b4ff8cc9c9be18d9354a403dafa646578
-
SHA256
3832b679932e2c26c289ae62ff5f0db97022e6ed2067a43e62e3e6e3d155a52b
-
SHA512
e3b5613d34229dce20cf9fb9f9f2ccee25667ffa51c0b223138d32a2ddadc06cae09f113ea71dd17dd026aafd020480571758bd78a2c72feaa1878dee6e014fb
-
SSDEEP
1536:y0QHkW+wLPQJUxvt6EY1ymPysEU3HUjsj2GghbntXB4R:yn0CjtMEY8Zs3ZjWwR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4584 17b68a0f34217caa05c8f78d44a21291.exe -
Executes dropped EXE 1 IoCs
pid Process 4584 17b68a0f34217caa05c8f78d44a21291.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 212 17b68a0f34217caa05c8f78d44a21291.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 212 17b68a0f34217caa05c8f78d44a21291.exe 4584 17b68a0f34217caa05c8f78d44a21291.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 212 wrote to memory of 4584 212 17b68a0f34217caa05c8f78d44a21291.exe 77 PID 212 wrote to memory of 4584 212 17b68a0f34217caa05c8f78d44a21291.exe 77 PID 212 wrote to memory of 4584 212 17b68a0f34217caa05c8f78d44a21291.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\17b68a0f34217caa05c8f78d44a21291.exe"C:\Users\Admin\AppData\Local\Temp\17b68a0f34217caa05c8f78d44a21291.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\17b68a0f34217caa05c8f78d44a21291.exeC:\Users\Admin\AppData\Local\Temp\17b68a0f34217caa05c8f78d44a21291.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4584
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5e615f7f665b00c9a6046b09f811c78f0
SHA133d7435fea736ef142c97edbee5278a8e113fc60
SHA256791765fa59471e002827d3fd5f8cf15a2fc1c25969c91a31e5dead9bf5683aaa
SHA512d7fe4d2d7fba946008f570132bb8ed48cbfe66defaf4b1f4ad3c666c6c0919f6fc8d8dccb2841c8be8580628d200adc7e5e776b0eba2f89fd5a29e1a19212a7c