Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:14
Behavioral task
behavioral1
Sample
2b615b11608b3d94be1a1b1454f83997.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b615b11608b3d94be1a1b1454f83997.exe
Resource
win10v2004-20231215-en
General
-
Target
2b615b11608b3d94be1a1b1454f83997.exe
-
Size
5.8MB
-
MD5
2b615b11608b3d94be1a1b1454f83997
-
SHA1
b542c7d66c74bc0d98c5e5134f1b8c04532c09ec
-
SHA256
4f3391629abbaa12a12a95059962d86e45ab59b86f9e7bf8d5a33715615ac41d
-
SHA512
7e2ef28dd7e48a004ad366af8c95f9811350b461963d182fd8a2a059ae581388ec9bf411c3a19bbdbb965290f16a5be7d178bfd5e42f5a3b741505d2a0888e17
-
SSDEEP
98304:mxHKjNm9TtUJYUyVGQZaXhP5a9UEI+eG9jAkbkR79D+cVItGQZaXhP5a9UEI+eG:mr9ZmynGhRaaCkN9qHGhRa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1948 2b615b11608b3d94be1a1b1454f83997.exe -
Executes dropped EXE 1 IoCs
pid Process 1948 2b615b11608b3d94be1a1b1454f83997.exe -
resource yara_rule behavioral2/memory/1712-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/1948-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000002304b-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1712 2b615b11608b3d94be1a1b1454f83997.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1712 2b615b11608b3d94be1a1b1454f83997.exe 1948 2b615b11608b3d94be1a1b1454f83997.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1948 1712 2b615b11608b3d94be1a1b1454f83997.exe 21 PID 1712 wrote to memory of 1948 1712 2b615b11608b3d94be1a1b1454f83997.exe 21 PID 1712 wrote to memory of 1948 1712 2b615b11608b3d94be1a1b1454f83997.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b615b11608b3d94be1a1b1454f83997.exe"C:\Users\Admin\AppData\Local\Temp\2b615b11608b3d94be1a1b1454f83997.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\2b615b11608b3d94be1a1b1454f83997.exeC:\Users\Admin\AppData\Local\Temp\2b615b11608b3d94be1a1b1454f83997.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1948
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD5f48816592981335613dd478d410c10d4
SHA1a18898791768e990cb049d96022fa45ad13470cc
SHA256153342e77afdb28f969b7f653f5bf6b3f636196d40a9082bfb596120eafb7458
SHA512311d8622946eab98102f39b56415d0aa1d1f917a69e1dbf1105338a35fc706bf306cc90de13dd4fc2016b95627501a8a41b03af80022e0d32e6beae453ae1adb