Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:50
Behavioral task
behavioral1
Sample
190f09a068fbc8535fd1a697fb6ff812.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
190f09a068fbc8535fd1a697fb6ff812.exe
Resource
win10v2004-20231215-en
General
-
Target
190f09a068fbc8535fd1a697fb6ff812.exe
-
Size
5.8MB
-
MD5
190f09a068fbc8535fd1a697fb6ff812
-
SHA1
de2e9aeae1fc173dcd03fe7cd1bcac2736ce217c
-
SHA256
6f44c467a1c711b28cd5542772a582be3c46a4bcbee13a3befe8e7f1dc89a06f
-
SHA512
427d29a0384fa5edad9144e8f18ea22d5bdb04cca43ba864871aba5d989b280a466e1478a517fd665e7e54246524953c83b3b6f88052616dbbeab7cc7beb7c1e
-
SSDEEP
98304:wzIVsNdY3qgXPF2gg3gnl/IVUs1jePsmNyvu+OJMn8GnwWcV2gg3gnl/IVUs1jek:AImNdY6gtygl/iBiPZyvu+Oin8GwGgll
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4900 190f09a068fbc8535fd1a697fb6ff812.exe -
Executes dropped EXE 1 IoCs
pid Process 4900 190f09a068fbc8535fd1a697fb6ff812.exe -
resource yara_rule behavioral2/memory/5040-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000600000001e0ce-11.dat upx behavioral2/memory/4900-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5040 190f09a068fbc8535fd1a697fb6ff812.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5040 190f09a068fbc8535fd1a697fb6ff812.exe 4900 190f09a068fbc8535fd1a697fb6ff812.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5040 wrote to memory of 4900 5040 190f09a068fbc8535fd1a697fb6ff812.exe 92 PID 5040 wrote to memory of 4900 5040 190f09a068fbc8535fd1a697fb6ff812.exe 92 PID 5040 wrote to memory of 4900 5040 190f09a068fbc8535fd1a697fb6ff812.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\190f09a068fbc8535fd1a697fb6ff812.exe"C:\Users\Admin\AppData\Local\Temp\190f09a068fbc8535fd1a697fb6ff812.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\190f09a068fbc8535fd1a697fb6ff812.exeC:\Users\Admin\AppData\Local\Temp\190f09a068fbc8535fd1a697fb6ff812.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4900
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD51bf01f7111e2c823bd855abdfea793a5
SHA189380d2eb0fc961d8a34138fb3ddbb1ce862b84f
SHA25663555c6864ab9b51acb1625f03e0c282cc8d65b3cc5d68d1792e520a8c5705c1
SHA512c86416515f66369b3dd44c35f97fca6acd4d22f20261d6edede94b74082c98c851bcd0a4de9e5ddfb6e047256284381b9c357e0b50c379187d9fae4b32cba397