Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2318a29260a04a40f600f1bae1c751b8.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
2318a29260a04a40f600f1bae1c751b8.exe
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
2318a29260a04a40f600f1bae1c751b8.exe
-
Size
82KB
-
MD5
2318a29260a04a40f600f1bae1c751b8
-
SHA1
9186a091f0068c8527d795fb8aa6482f18180d54
-
SHA256
0c35321e7d26eb96165fc336a172e4631bc7f44a59bf79d36486a0bee47726ec
-
SHA512
92e4031e9006e92652df829d7908b361b5e01a1fe75ce8ec52988c76fb239e663ade544ab530d97162bcfc254f97dc3d0256f7cd7de2d989bd8243712d03ffff
-
SSDEEP
1536:bcjs3ctD+RrMOzVOrsIPdfrzcfwCbXFYc4RcjwsH2dmMa9:psh+RBUoI5cHWfUwNY
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3236 2318a29260a04a40f600f1bae1c751b8.exe -
Executes dropped EXE 1 IoCs
pid Process 3236 2318a29260a04a40f600f1bae1c751b8.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3536 2318a29260a04a40f600f1bae1c751b8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3536 2318a29260a04a40f600f1bae1c751b8.exe 3236 2318a29260a04a40f600f1bae1c751b8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3536 wrote to memory of 3236 3536 2318a29260a04a40f600f1bae1c751b8.exe 18 PID 3536 wrote to memory of 3236 3536 2318a29260a04a40f600f1bae1c751b8.exe 18 PID 3536 wrote to memory of 3236 3536 2318a29260a04a40f600f1bae1c751b8.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\2318a29260a04a40f600f1bae1c751b8.exe"C:\Users\Admin\AppData\Local\Temp\2318a29260a04a40f600f1bae1c751b8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\2318a29260a04a40f600f1bae1c751b8.exeC:\Users\Admin\AppData\Local\Temp\2318a29260a04a40f600f1bae1c751b8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3236
-