Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:51
Behavioral task
behavioral1
Sample
2ab2e315a90706366c539c3c23c3a3e4.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ab2e315a90706366c539c3c23c3a3e4.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
2ab2e315a90706366c539c3c23c3a3e4.exe
-
Size
2.7MB
-
MD5
2ab2e315a90706366c539c3c23c3a3e4
-
SHA1
b6dd89e125233a9720a3ff40ac169d33cb8e183d
-
SHA256
66d2bacf5fb59541a07c80a64d1e08d00b0b997360936bb630cf406b9ce824e7
-
SHA512
31dc9bf8e54f6575a354e2c4ec900279706f47555173be2e9be76abcf38185a1eba4876b2cac8259c568e5f40d6303f0b62cf5d337f1aa7e7f7bfb8b0e97dbba
-
SSDEEP
49152:wwunhPtdqZp5NnoHEtYG0obx1IQzd5rK5MR44U9mI1w:wNhPt8Z7pyJGRIQz/KJRw
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3344 2ab2e315a90706366c539c3c23c3a3e4.exe -
Executes dropped EXE 1 IoCs
pid Process 3344 2ab2e315a90706366c539c3c23c3a3e4.exe -
resource yara_rule behavioral2/memory/5024-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/3344-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5024 2ab2e315a90706366c539c3c23c3a3e4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5024 2ab2e315a90706366c539c3c23c3a3e4.exe 3344 2ab2e315a90706366c539c3c23c3a3e4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5024 wrote to memory of 3344 5024 2ab2e315a90706366c539c3c23c3a3e4.exe 20 PID 5024 wrote to memory of 3344 5024 2ab2e315a90706366c539c3c23c3a3e4.exe 20 PID 5024 wrote to memory of 3344 5024 2ab2e315a90706366c539c3c23c3a3e4.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ab2e315a90706366c539c3c23c3a3e4.exe"C:\Users\Admin\AppData\Local\Temp\2ab2e315a90706366c539c3c23c3a3e4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\2ab2e315a90706366c539c3c23c3a3e4.exeC:\Users\Admin\AppData\Local\Temp\2ab2e315a90706366c539c3c23c3a3e4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3344
-