Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
179s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 07:18
Behavioral task
behavioral1
Sample
2d1433fff103c4963cd7769d86cdf442.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d1433fff103c4963cd7769d86cdf442.exe
Resource
win10v2004-20231215-en
General
-
Target
2d1433fff103c4963cd7769d86cdf442.exe
-
Size
5.8MB
-
MD5
2d1433fff103c4963cd7769d86cdf442
-
SHA1
9d54569511864fe7d56734bf9d126e5c868ba2b5
-
SHA256
c2a95be9175b96580272bd1dee0d92cdba5750a16cad14562ff388a8bfbc7a6d
-
SHA512
20661a6b91549861ef67d773432dc8353a057aa0e07fc1b64ce61c28a84a6911b89065f04ecac643d6ec979245636a309e013619377ad73cb7e0985cd42e8314
-
SSDEEP
98304:RZ+s+FqvEa4HBUCczzM39F5v+aLzXo04o6ss8l/ipv4HBUCczzM3:R7+t5WCRF8a3Xl4o6sJipgWC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2232 2d1433fff103c4963cd7769d86cdf442.exe -
Executes dropped EXE 1 IoCs
pid Process 2232 2d1433fff103c4963cd7769d86cdf442.exe -
resource yara_rule behavioral2/memory/4156-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023207-11.dat upx behavioral2/memory/2232-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4156 2d1433fff103c4963cd7769d86cdf442.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4156 2d1433fff103c4963cd7769d86cdf442.exe 2232 2d1433fff103c4963cd7769d86cdf442.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4156 wrote to memory of 2232 4156 2d1433fff103c4963cd7769d86cdf442.exe 91 PID 4156 wrote to memory of 2232 4156 2d1433fff103c4963cd7769d86cdf442.exe 91 PID 4156 wrote to memory of 2232 4156 2d1433fff103c4963cd7769d86cdf442.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d1433fff103c4963cd7769d86cdf442.exe"C:\Users\Admin\AppData\Local\Temp\2d1433fff103c4963cd7769d86cdf442.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\2d1433fff103c4963cd7769d86cdf442.exeC:\Users\Admin\AppData\Local\Temp\2d1433fff103c4963cd7769d86cdf442.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2232
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5d41e939d9a031ad8d0ec34690f75f616
SHA18105351cabdc93b9dd3c91c01d7ac2b5922f93e3
SHA256ef76daa79dab6b0cabc3b14f91873b6dd4cfcb5e3db5e6513993c6008a62a6e1
SHA5122d76d523dddfbbf20824ea12e35de61ff3e99607ba2a7b8c7401c00f3ca2c6a5d4b4e0512fb8a16b34c8964093d454f12a37e31204a54f999429b6f5430205c2