Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 13:09
Behavioral task
behavioral1
Sample
1982c964128c8180d02c2133a6e12dc0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1982c964128c8180d02c2133a6e12dc0.exe
Resource
win10v2004-20231215-en
General
-
Target
1982c964128c8180d02c2133a6e12dc0.exe
-
Size
2.7MB
-
MD5
1982c964128c8180d02c2133a6e12dc0
-
SHA1
8ac98173a21f9d75abbda931edfe15ba4eb55219
-
SHA256
9d611f051778970b345bc0fa399d7a30ad7d94a021007a8f3877ea672fbb29b9
-
SHA512
1c99843f502fb14870a00a94eb1e9063dbc7461034385e95ea8420448589b83bc1dc2af8095a4b84dc06a83b8af8503337573581aa96fe7e2c23bad8f6e76ed7
-
SSDEEP
49152:QT0hn4fwvgA2C78R8834pm0rdD+yWR92i0QacYAxcU63DMcbGBAJUGuaR9j:QT0hlvP248RH3g9SH2hOYgcn3eBAJ7Hj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3452 1982c964128c8180d02c2133a6e12dc0.exe -
Executes dropped EXE 1 IoCs
pid Process 3452 1982c964128c8180d02c2133a6e12dc0.exe -
resource yara_rule behavioral2/memory/4452-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x00070000000231f5-11.dat upx behavioral2/memory/3452-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4452 1982c964128c8180d02c2133a6e12dc0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4452 1982c964128c8180d02c2133a6e12dc0.exe 3452 1982c964128c8180d02c2133a6e12dc0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4452 wrote to memory of 3452 4452 1982c964128c8180d02c2133a6e12dc0.exe 90 PID 4452 wrote to memory of 3452 4452 1982c964128c8180d02c2133a6e12dc0.exe 90 PID 4452 wrote to memory of 3452 4452 1982c964128c8180d02c2133a6e12dc0.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1982c964128c8180d02c2133a6e12dc0.exe"C:\Users\Admin\AppData\Local\Temp\1982c964128c8180d02c2133a6e12dc0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\1982c964128c8180d02c2133a6e12dc0.exeC:\Users\Admin\AppData\Local\Temp\1982c964128c8180d02c2133a6e12dc0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3452
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD58007f28e2dfa3faa211f32edfb25fc38
SHA1a03625a739e255d8ced6b114cd7cd94bde634ffa
SHA256224d868a9d7ef6d67635a100117b1a0221fb406b339ff1b055fcc69930a7269a
SHA512605efe344e19763493024b1f2bcbdc2ee9f421699fa721ccb8f2ead5eb21380021cabc39eb674396279a658d3f935e48d15e828168be36e53752d3bf61d60d62