Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:06
Behavioral task
behavioral1
Sample
2112644c978fa5f73525fc9cc109de54.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2112644c978fa5f73525fc9cc109de54.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
2112644c978fa5f73525fc9cc109de54.exe
-
Size
1.3MB
-
MD5
2112644c978fa5f73525fc9cc109de54
-
SHA1
9574740174a1f1d51e3ba7138f44f9badbb0b7a5
-
SHA256
a219618e67d113573c5d3d2638705f670415ba28ea8508e1fec029a2a877df2c
-
SHA512
22bee2905fff68af011223bdf8a64d2b3f30c359ff46bebbba0d1fdbd60b8b132a0f03079d7982b8a804451f079901a95d9f646b2d3dc0618f073c76f4cf6639
-
SSDEEP
24576:ovDm8UhABGFhs7VgcL3UalJRpbO6bpqcl0F6hJivNEshWc:ovDu9FhNAX/RpC6bpqLUhMhp
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2068 2112644c978fa5f73525fc9cc109de54.exe -
Executes dropped EXE 1 IoCs
pid Process 2068 2112644c978fa5f73525fc9cc109de54.exe -
resource yara_rule behavioral2/memory/1160-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1160 2112644c978fa5f73525fc9cc109de54.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1160 2112644c978fa5f73525fc9cc109de54.exe 2068 2112644c978fa5f73525fc9cc109de54.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1160 wrote to memory of 2068 1160 2112644c978fa5f73525fc9cc109de54.exe 18 PID 1160 wrote to memory of 2068 1160 2112644c978fa5f73525fc9cc109de54.exe 18 PID 1160 wrote to memory of 2068 1160 2112644c978fa5f73525fc9cc109de54.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\2112644c978fa5f73525fc9cc109de54.exe"C:\Users\Admin\AppData\Local\Temp\2112644c978fa5f73525fc9cc109de54.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\2112644c978fa5f73525fc9cc109de54.exeC:\Users\Admin\AppData\Local\Temp\2112644c978fa5f73525fc9cc109de54.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2068
-