Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:38
Behavioral task
behavioral1
Sample
21ff8171a6e7cd1d0314b60bdda4577d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21ff8171a6e7cd1d0314b60bdda4577d.exe
Resource
win10v2004-20231222-en
General
-
Target
21ff8171a6e7cd1d0314b60bdda4577d.exe
-
Size
2.9MB
-
MD5
21ff8171a6e7cd1d0314b60bdda4577d
-
SHA1
da72f0b20c5670e9c63c5d30db2b10c8f6f3b51d
-
SHA256
0c0dea6dd0c7cbfdf19b3b238c74bc871cf56c7f171c7d85973500cb9ebe1e53
-
SHA512
1885d428d250307045ca7e9cf03707315da10cef99620e29b5cc46b31c9e71d304d45b8ce7a535b6add3c5b7076a1b4cf93080ff510f579bf1eb199f5a36ea06
-
SSDEEP
49152:9NbBriILheT4DcW9wpN74NH5HUyNRcUsCVOzetdZJ:dpw4Ibp4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4300 21ff8171a6e7cd1d0314b60bdda4577d.exe -
Executes dropped EXE 1 IoCs
pid Process 4300 21ff8171a6e7cd1d0314b60bdda4577d.exe -
resource yara_rule behavioral2/memory/3916-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00080000000231fc-11.dat upx behavioral2/memory/4300-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3916 21ff8171a6e7cd1d0314b60bdda4577d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3916 21ff8171a6e7cd1d0314b60bdda4577d.exe 4300 21ff8171a6e7cd1d0314b60bdda4577d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3916 wrote to memory of 4300 3916 21ff8171a6e7cd1d0314b60bdda4577d.exe 19 PID 3916 wrote to memory of 4300 3916 21ff8171a6e7cd1d0314b60bdda4577d.exe 19 PID 3916 wrote to memory of 4300 3916 21ff8171a6e7cd1d0314b60bdda4577d.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\21ff8171a6e7cd1d0314b60bdda4577d.exe"C:\Users\Admin\AppData\Local\Temp\21ff8171a6e7cd1d0314b60bdda4577d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\21ff8171a6e7cd1d0314b60bdda4577d.exeC:\Users\Admin\AppData\Local\Temp\21ff8171a6e7cd1d0314b60bdda4577d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4300
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD54173687304c2213e4748bf9a0e9556ad
SHA15b769c8ed21f9e68b8b076d128c7e363df3e5b8f
SHA25608d6ad3455dacc0ecb122044bdbc245c537542ad7c9f59fc39e0793ab4dd9567
SHA5122fb1ebde833500d4b6ca788b8cd64bf265b53f446b7d5452d5c5ff49e5fe9a800eacdb1864d6be905b1e75166fa51cda57af38a7d66db71040977b4d487200b6