Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 20:11

General

  • Target

    1b94922fff54adba4f2a5dbec5987ae8.exe

  • Size

    302KB

  • MD5

    1b94922fff54adba4f2a5dbec5987ae8

  • SHA1

    32288fc7494be817bdceb680b39be7137ba12dbf

  • SHA256

    2b7b5b9a31965c583576f2cca0ecd8195ad6ed7e16e32c2aa3c58d5c2d2b8c2c

  • SHA512

    7e11809126de93b45abb7c5d0d4673bfbf2322eac620603d702f859197b4354d6b56e5fd15be3e9f248fe7de4123376bf0be8fc71fc8df208dc1b3a938ef2cf5

  • SSDEEP

    6144:w0hZx9uQSQNyVUjTklFDpv3tF7B52o+/q0mQ:nXuQHktrz2o+Bm

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b94922fff54adba4f2a5dbec5987ae8.exe
    "C:\Users\Admin\AppData\Local\Temp\1b94922fff54adba4f2a5dbec5987ae8.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Users\Admin\AppData\Local\Temp\1b94922fff54adba4f2a5dbec5987ae8.exe
      C:\Users\Admin\AppData\Local\Temp\1b94922fff54adba4f2a5dbec5987ae8.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1b94922fff54adba4f2a5dbec5987ae8.exe

    Filesize

    302KB

    MD5

    ca1379a128d54855c884dbf44ec3598b

    SHA1

    fa59f9ec8214b7c43d124acad0fb62121e55028e

    SHA256

    c03e080c2319da96d2342354ed9bf556aa0cf263e292637f5cf92bc7c7c5e5c3

    SHA512

    537c92f18838fe9a62d6a875b692aa0a9473061efcb9cf08401b5d2a54532599043aa764a5aea82e4fb2334c99dfdbb890d89c56471096340fc2dd38a2ba5458

  • memory/2236-14-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2236-16-0x00000000014E0000-0x0000000001511000-memory.dmp

    Filesize

    196KB

  • memory/2236-30-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/3744-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/3744-1-0x0000000000100000-0x0000000000131000-memory.dmp

    Filesize

    196KB

  • memory/3744-2-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/3744-13-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB