Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:43
Behavioral task
behavioral1
Sample
2c0ff09b7f52c8d5751ed955a35811aa.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c0ff09b7f52c8d5751ed955a35811aa.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
2c0ff09b7f52c8d5751ed955a35811aa.exe
-
Size
2.7MB
-
MD5
2c0ff09b7f52c8d5751ed955a35811aa
-
SHA1
b89e0c8ca57f11c6c937bd20f16f87f7622d1071
-
SHA256
c1807361ce295b25109190a64192e52010c1ead7dd26147610aec925f9353175
-
SHA512
c31fb65faabddec800cc9423a80955ed9b7315035ed3e4554dbc94d11fcaf7b3d9a950dcff5a112465b7e585195583be50a2228eecd27d17501bc98d2010876d
-
SSDEEP
49152:Nxdz0+Ho6/sfuNRWc3YAqkTQv/NUm6kB2remntqhcOgV+Cz0asildD:D2gocsW+c3YAqQUWkBtWOgQCz8ild
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4104 2c0ff09b7f52c8d5751ed955a35811aa.exe -
Executes dropped EXE 1 IoCs
pid Process 4104 2c0ff09b7f52c8d5751ed955a35811aa.exe -
resource yara_rule behavioral2/memory/4104-15-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/5088-0-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5088 2c0ff09b7f52c8d5751ed955a35811aa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5088 2c0ff09b7f52c8d5751ed955a35811aa.exe 4104 2c0ff09b7f52c8d5751ed955a35811aa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4104 5088 2c0ff09b7f52c8d5751ed955a35811aa.exe 18 PID 5088 wrote to memory of 4104 5088 2c0ff09b7f52c8d5751ed955a35811aa.exe 18 PID 5088 wrote to memory of 4104 5088 2c0ff09b7f52c8d5751ed955a35811aa.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c0ff09b7f52c8d5751ed955a35811aa.exe"C:\Users\Admin\AppData\Local\Temp\2c0ff09b7f52c8d5751ed955a35811aa.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\2c0ff09b7f52c8d5751ed955a35811aa.exeC:\Users\Admin\AppData\Local\Temp\2c0ff09b7f52c8d5751ed955a35811aa.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4104
-