Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:33
Behavioral task
behavioral1
Sample
2a29ab79d6ede1443ebcf244b73c8616.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a29ab79d6ede1443ebcf244b73c8616.exe
Resource
win10v2004-20231215-en
General
-
Target
2a29ab79d6ede1443ebcf244b73c8616.exe
-
Size
1.3MB
-
MD5
2a29ab79d6ede1443ebcf244b73c8616
-
SHA1
6a044f0fad4d57ae2306224119bbbc46a11ed853
-
SHA256
47515a9f3393d805d8f72796623d1adea3c77b03af9ca90c7d4653dc1b8162d9
-
SHA512
771a62392c9f6cd2222adaa6ce37367df8987da795d5e56fcb20137b53cee2a83390c22a9508766f9116fe551d9adbd51688adef660dfa5bcee8b6dccb70b1a5
-
SSDEEP
24576:NuJt3Ef/mq6871hM7DmXiTUwDZzsX5WTxe3vhZvG:w3Ef/TrSKAZQGxe3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1808 2a29ab79d6ede1443ebcf244b73c8616.exe -
Executes dropped EXE 1 IoCs
pid Process 1808 2a29ab79d6ede1443ebcf244b73c8616.exe -
resource yara_rule behavioral2/memory/2428-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/1808-13-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000f00000002314e-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2428 2a29ab79d6ede1443ebcf244b73c8616.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2428 2a29ab79d6ede1443ebcf244b73c8616.exe 1808 2a29ab79d6ede1443ebcf244b73c8616.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2428 wrote to memory of 1808 2428 2a29ab79d6ede1443ebcf244b73c8616.exe 89 PID 2428 wrote to memory of 1808 2428 2a29ab79d6ede1443ebcf244b73c8616.exe 89 PID 2428 wrote to memory of 1808 2428 2a29ab79d6ede1443ebcf244b73c8616.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a29ab79d6ede1443ebcf244b73c8616.exe"C:\Users\Admin\AppData\Local\Temp\2a29ab79d6ede1443ebcf244b73c8616.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\2a29ab79d6ede1443ebcf244b73c8616.exeC:\Users\Admin\AppData\Local\Temp\2a29ab79d6ede1443ebcf244b73c8616.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1808
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5fbc15d8fdd6fc7fab9a5c5288e27bbd5
SHA187fcb7117679059db2cb5da62a961b95a3202577
SHA256d3fcb25ef8a4cdc38792a08f8c56cd296c23675f7bcdbfc0ccb925fbcd1464a9
SHA512b83b3b236ae68fb5690939f1bbebc408460fec3c42785e94bf69e23c1e146b77e1bd10acd9c7927092a4e4e52dd1eef969a154cbaa96c79e41678ed11bbad464