Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:15
Behavioral task
behavioral1
Sample
1cac53798cd6b249b766690101ad8545.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1cac53798cd6b249b766690101ad8545.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
1cac53798cd6b249b766690101ad8545.exe
-
Size
5.3MB
-
MD5
1cac53798cd6b249b766690101ad8545
-
SHA1
39c92ed7c078faa3ed7fbbaf8fc79c5b902f57ac
-
SHA256
b0a4c18db8e3539f6e150c050854ed86e33273ad98460e47833f76406b439d2c
-
SHA512
a0f6b77bb1729b48e881eb646f6d790f2dd22f16a8d546bbe76e2767eace5e32ef281c8af219e3d04ceec5bbb2c2725e61c7af739169945cfe0d0771bd831f4b
-
SSDEEP
98304:2hC9TQkNbGxfDl8uCjp29PywSpJ40rDwANl28uCjp2p:AfkNw9CFmSnMa0CFI
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2088 1cac53798cd6b249b766690101ad8545.exe -
Executes dropped EXE 1 IoCs
pid Process 2088 1cac53798cd6b249b766690101ad8545.exe -
resource yara_rule behavioral2/memory/792-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/2088-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 792 1cac53798cd6b249b766690101ad8545.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 792 1cac53798cd6b249b766690101ad8545.exe 2088 1cac53798cd6b249b766690101ad8545.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 792 wrote to memory of 2088 792 1cac53798cd6b249b766690101ad8545.exe 21 PID 792 wrote to memory of 2088 792 1cac53798cd6b249b766690101ad8545.exe 21 PID 792 wrote to memory of 2088 792 1cac53798cd6b249b766690101ad8545.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cac53798cd6b249b766690101ad8545.exe"C:\Users\Admin\AppData\Local\Temp\1cac53798cd6b249b766690101ad8545.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\1cac53798cd6b249b766690101ad8545.exeC:\Users\Admin\AppData\Local\Temp\1cac53798cd6b249b766690101ad8545.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2088
-