Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:21
Behavioral task
behavioral1
Sample
2185cc277bc269ca14a597462510bcb7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2185cc277bc269ca14a597462510bcb7.exe
Resource
win10v2004-20231215-en
General
-
Target
2185cc277bc269ca14a597462510bcb7.exe
-
Size
5.8MB
-
MD5
2185cc277bc269ca14a597462510bcb7
-
SHA1
423aee88889b426e225f97c5fd99b71b09ca352b
-
SHA256
93fe9b5a7302dae331722857138e20f17fbe5af31c4466a9ac0b6400d3a2e807
-
SHA512
5b200c27c85279c1a4db79b29ef1bd60e0bcfdd0dd9263f4b7ef2539337856b1e8685b060426e0c70fb358084867fba0521bd8f5e265d35b5b4d9f78d610bf8f
-
SSDEEP
98304:Eqc0eQjUX9q5qjgg3gnl/IVUs1jePsqthvHrFHa7a1gg3gnl/IVUs1jePs:EqxeHz5gl/iBiPftLIagl/iBiP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3844 2185cc277bc269ca14a597462510bcb7.exe -
Executes dropped EXE 1 IoCs
pid Process 3844 2185cc277bc269ca14a597462510bcb7.exe -
resource yara_rule behavioral2/memory/2776-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000c000000023174-11.dat upx behavioral2/memory/3844-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2776 2185cc277bc269ca14a597462510bcb7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2776 2185cc277bc269ca14a597462510bcb7.exe 3844 2185cc277bc269ca14a597462510bcb7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2776 wrote to memory of 3844 2776 2185cc277bc269ca14a597462510bcb7.exe 27 PID 2776 wrote to memory of 3844 2776 2185cc277bc269ca14a597462510bcb7.exe 27 PID 2776 wrote to memory of 3844 2776 2185cc277bc269ca14a597462510bcb7.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2185cc277bc269ca14a597462510bcb7.exe"C:\Users\Admin\AppData\Local\Temp\2185cc277bc269ca14a597462510bcb7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\2185cc277bc269ca14a597462510bcb7.exeC:\Users\Admin\AppData\Local\Temp\2185cc277bc269ca14a597462510bcb7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3844
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD53535647918f2dd5f3b286084b7b5b47d
SHA18e492063d277e1342ae7928625de23373eae628a
SHA2564d23e5af7dd6b0e08ac20e00f90ce22e26f7892836781c1f58b41fd3af8a934f
SHA512419e14a3e15e549cceff053079f1b0f7aef17c136d14f04198dc829d88dcfbf29074678748fde6136cbe20b17623e17e13180a1ed229db06a8773b06c3ad1ab8