Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
248f83cf374d56d59cfdba8691e2c9ae.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
248f83cf374d56d59cfdba8691e2c9ae.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
248f83cf374d56d59cfdba8691e2c9ae.exe
-
Size
84KB
-
MD5
248f83cf374d56d59cfdba8691e2c9ae
-
SHA1
0f7e173da867f2c97fb35a81314e6a5982a5b477
-
SHA256
529d113d4b046ca0f9cfb851d688d5645211ac037a87c454f0eb9f29e355d241
-
SHA512
9df50af46048757023ebc8291c562cc32bdb6ac58246e5783318e62f93f5411e06a10e6f9cdf3294429068083e6b20c7f480c8828282ccfd78a4ca337d06b114
-
SSDEEP
1536:iNk9tlFNzm2X3D5/I+jzLAmv6zM6HpgXMgkR7A6bBaqf+poKuLXgL9q:igtc2HF/PPAjH66kKN0ewRq
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5024 248f83cf374d56d59cfdba8691e2c9ae.exe -
Executes dropped EXE 1 IoCs
pid Process 5024 248f83cf374d56d59cfdba8691e2c9ae.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4388 248f83cf374d56d59cfdba8691e2c9ae.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4388 248f83cf374d56d59cfdba8691e2c9ae.exe 5024 248f83cf374d56d59cfdba8691e2c9ae.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4388 wrote to memory of 5024 4388 248f83cf374d56d59cfdba8691e2c9ae.exe 21 PID 4388 wrote to memory of 5024 4388 248f83cf374d56d59cfdba8691e2c9ae.exe 21 PID 4388 wrote to memory of 5024 4388 248f83cf374d56d59cfdba8691e2c9ae.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\248f83cf374d56d59cfdba8691e2c9ae.exe"C:\Users\Admin\AppData\Local\Temp\248f83cf374d56d59cfdba8691e2c9ae.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\248f83cf374d56d59cfdba8691e2c9ae.exeC:\Users\Admin\AppData\Local\Temp\248f83cf374d56d59cfdba8691e2c9ae.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5024
-