Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:42
Behavioral task
behavioral1
Sample
18dd4df7688d04c38e04c1d87a2b148a.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
18dd4df7688d04c38e04c1d87a2b148a.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
18dd4df7688d04c38e04c1d87a2b148a.exe
-
Size
1.5MB
-
MD5
18dd4df7688d04c38e04c1d87a2b148a
-
SHA1
b190b0bdc620c2018fccb4fb6dcf12b2bca77370
-
SHA256
5f1e7dabfaab0f9ce962960b73d48ee989ff373131097050dbb7b78ea5d83544
-
SHA512
690dbf8627ab3d57beef9ebba6ed6e42d2898a0ebb541073bd647eb0ed9a440159765946ebb5070592797f95e15fa6c5ef210734c4a2c17a23a96aaeb22fb49f
-
SSDEEP
24576:OoS9vCiad410r8IK1yCYAxijBAQ6G2wt7oLC/yeNd7flwPYw2UELi0GXW:OoSkd49IK1riFMR67oLwBNd7KA/UEO0u
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4924 18dd4df7688d04c38e04c1d87a2b148a.exe -
Executes dropped EXE 1 IoCs
pid Process 4924 18dd4df7688d04c38e04c1d87a2b148a.exe -
resource yara_rule behavioral2/memory/1892-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000400000001e96f-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1892 18dd4df7688d04c38e04c1d87a2b148a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1892 18dd4df7688d04c38e04c1d87a2b148a.exe 4924 18dd4df7688d04c38e04c1d87a2b148a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1892 wrote to memory of 4924 1892 18dd4df7688d04c38e04c1d87a2b148a.exe 91 PID 1892 wrote to memory of 4924 1892 18dd4df7688d04c38e04c1d87a2b148a.exe 91 PID 1892 wrote to memory of 4924 1892 18dd4df7688d04c38e04c1d87a2b148a.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\18dd4df7688d04c38e04c1d87a2b148a.exe"C:\Users\Admin\AppData\Local\Temp\18dd4df7688d04c38e04c1d87a2b148a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\18dd4df7688d04c38e04c1d87a2b148a.exeC:\Users\Admin\AppData\Local\Temp\18dd4df7688d04c38e04c1d87a2b148a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4924
-