Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
2a15bc0684b7ef794781c65aa36bff96.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a15bc0684b7ef794781c65aa36bff96.exe
Resource
win10v2004-20231222-en
General
-
Target
2a15bc0684b7ef794781c65aa36bff96.exe
-
Size
82KB
-
MD5
2a15bc0684b7ef794781c65aa36bff96
-
SHA1
16a1f51f989747c524f42b51c1b26a9b6c6befce
-
SHA256
e26cc6e1f39d0d8d0d730ec572e1efaa405ef354d7dc61bc333a27ee89de6873
-
SHA512
a0f41029f1b475cd5a49053e6a8d1198ae7e37e8b1e1503abe10b3be1f9a8c3288e9e086287d33fe6336782c776297dedc9023187d3cf55c393517eb418e7aa8
-
SSDEEP
1536:vWfLStpZtIe/b2SdiSEt2EiqFRnQ0Zh+2RC2raiVU+elN+5T:ef+pse/b2Sdip9bZhngamlN+p
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 208 2a15bc0684b7ef794781c65aa36bff96.exe -
Executes dropped EXE 1 IoCs
pid Process 208 2a15bc0684b7ef794781c65aa36bff96.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4156 2a15bc0684b7ef794781c65aa36bff96.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4156 2a15bc0684b7ef794781c65aa36bff96.exe 208 2a15bc0684b7ef794781c65aa36bff96.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4156 wrote to memory of 208 4156 2a15bc0684b7ef794781c65aa36bff96.exe 18 PID 4156 wrote to memory of 208 4156 2a15bc0684b7ef794781c65aa36bff96.exe 18 PID 4156 wrote to memory of 208 4156 2a15bc0684b7ef794781c65aa36bff96.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a15bc0684b7ef794781c65aa36bff96.exe"C:\Users\Admin\AppData\Local\Temp\2a15bc0684b7ef794781c65aa36bff96.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\2a15bc0684b7ef794781c65aa36bff96.exeC:\Users\Admin\AppData\Local\Temp\2a15bc0684b7ef794781c65aa36bff96.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:208
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD516d30bd17bf1f842413fc7e1b6148bbe
SHA1dbb248c4a8f4ece398bd2d4309c63f39fbdff672
SHA2561b29ea13abb9bd94a7d05cfe57c7f0828d1f405e722a6a561408ce635caf904d
SHA512e5fb72e6c0d71747b54429f3baf894e69dd5f9ec6b3ba952cb70258c6554f7940f4afd8bec32b0335b7a51985365d2d6638744c30deaea3f2c1ef5b43825b7eb