Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 12:50

General

  • Target

    190f09a068fbc8535fd1a697fb6ff812.exe

  • Size

    5.8MB

  • MD5

    190f09a068fbc8535fd1a697fb6ff812

  • SHA1

    de2e9aeae1fc173dcd03fe7cd1bcac2736ce217c

  • SHA256

    6f44c467a1c711b28cd5542772a582be3c46a4bcbee13a3befe8e7f1dc89a06f

  • SHA512

    427d29a0384fa5edad9144e8f18ea22d5bdb04cca43ba864871aba5d989b280a466e1478a517fd665e7e54246524953c83b3b6f88052616dbbeab7cc7beb7c1e

  • SSDEEP

    98304:wzIVsNdY3qgXPF2gg3gnl/IVUs1jePsmNyvu+OJMn8GnwWcV2gg3gnl/IVUs1jek:AImNdY6gtygl/iBiPZyvu+Oin8GwGgll

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\190f09a068fbc8535fd1a697fb6ff812.exe
    "C:\Users\Admin\AppData\Local\Temp\190f09a068fbc8535fd1a697fb6ff812.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Users\Admin\AppData\Local\Temp\190f09a068fbc8535fd1a697fb6ff812.exe
      C:\Users\Admin\AppData\Local\Temp\190f09a068fbc8535fd1a697fb6ff812.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\190f09a068fbc8535fd1a697fb6ff812.exe

    Filesize

    5.8MB

    MD5

    1bf01f7111e2c823bd855abdfea793a5

    SHA1

    89380d2eb0fc961d8a34138fb3ddbb1ce862b84f

    SHA256

    63555c6864ab9b51acb1625f03e0c282cc8d65b3cc5d68d1792e520a8c5705c1

    SHA512

    c86416515f66369b3dd44c35f97fca6acd4d22f20261d6edede94b74082c98c851bcd0a4de9e5ddfb6e047256284381b9c357e0b50c379187d9fae4b32cba397

  • memory/4900-13-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/4900-15-0x0000000001D50000-0x0000000001E83000-memory.dmp

    Filesize

    1.2MB

  • memory/4900-14-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/4900-20-0x0000000005650000-0x000000000587A000-memory.dmp

    Filesize

    2.2MB

  • memory/4900-21-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/4900-27-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/5040-0-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/5040-1-0x00000000018F0000-0x0000000001A23000-memory.dmp

    Filesize

    1.2MB

  • memory/5040-2-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/5040-12-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB