Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:46
Behavioral task
behavioral1
Sample
26d9260b6f0203e5e298e4b5e5ef7ea0.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
26d9260b6f0203e5e298e4b5e5ef7ea0.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
26d9260b6f0203e5e298e4b5e5ef7ea0.exe
-
Size
2.7MB
-
MD5
26d9260b6f0203e5e298e4b5e5ef7ea0
-
SHA1
b7e7e951ee6bf0e8bbb2b5e4bf05e152d802f7bc
-
SHA256
bda73a7c4679c5ba0af8cfec29d5e1b02666412579f6106c4a0bce018ee064bd
-
SHA512
ae348e7ff9f185b0e822478f9e449c0c9f29dfcac9b4807e3ce3845cc49aa3a940f9d39b0078fe34af4783ea37b787ac5bf9f22419c4af1102d586da8f1b9a6f
-
SSDEEP
49152:J9QvFdt9La5SGhCok2on9jAVTkR98hFsb6aZ4SNYLM1X+hXZE50R9j:J9QvFp8CokR9jQTkH9mELsXZE0Hj
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1188 26d9260b6f0203e5e298e4b5e5ef7ea0.exe -
Executes dropped EXE 1 IoCs
pid Process 1188 26d9260b6f0203e5e298e4b5e5ef7ea0.exe -
resource yara_rule behavioral2/memory/4144-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/memory/1188-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4144 26d9260b6f0203e5e298e4b5e5ef7ea0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4144 26d9260b6f0203e5e298e4b5e5ef7ea0.exe 1188 26d9260b6f0203e5e298e4b5e5ef7ea0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4144 wrote to memory of 1188 4144 26d9260b6f0203e5e298e4b5e5ef7ea0.exe 42 PID 4144 wrote to memory of 1188 4144 26d9260b6f0203e5e298e4b5e5ef7ea0.exe 42 PID 4144 wrote to memory of 1188 4144 26d9260b6f0203e5e298e4b5e5ef7ea0.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\26d9260b6f0203e5e298e4b5e5ef7ea0.exe"C:\Users\Admin\AppData\Local\Temp\26d9260b6f0203e5e298e4b5e5ef7ea0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\26d9260b6f0203e5e298e4b5e5ef7ea0.exeC:\Users\Admin\AppData\Local\Temp\26d9260b6f0203e5e298e4b5e5ef7ea0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1188
-