Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:50
Behavioral task
behavioral1
Sample
38b2eca13553190ac120dfc15b341aab.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
38b2eca13553190ac120dfc15b341aab.exe
Resource
win10v2004-20231215-en
General
-
Target
38b2eca13553190ac120dfc15b341aab.exe
-
Size
1.5MB
-
MD5
38b2eca13553190ac120dfc15b341aab
-
SHA1
9ce646efb4921c96017d1aca50a4294d3efa4297
-
SHA256
05f3c61c8ef01eec11c70e772bdcce7079cb2ae7aada9ebdcbf73f9505022626
-
SHA512
d2387e7424da2118f4f3b28f40836cba43f2f542b9a520fddf757b51a8ee7b7c4e81785a70cc486e16c8000a48b7f6b68271904534ca1f64f1dba945b7beba2b
-
SSDEEP
24576:fLLa8po5D2eP4tAZze7RkuOPQi+C3X5VN7x30FlbxN9aHvLMk5CJAfCloBDwW:/M5D2KZgkuOIE5VUPYgk5CgC4Dw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2584 38b2eca13553190ac120dfc15b341aab.exe -
Executes dropped EXE 1 IoCs
pid Process 2584 38b2eca13553190ac120dfc15b341aab.exe -
resource yara_rule behavioral2/memory/3356-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000001e0ce-11.dat upx behavioral2/memory/2584-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3356 38b2eca13553190ac120dfc15b341aab.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3356 38b2eca13553190ac120dfc15b341aab.exe 2584 38b2eca13553190ac120dfc15b341aab.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3356 wrote to memory of 2584 3356 38b2eca13553190ac120dfc15b341aab.exe 90 PID 3356 wrote to memory of 2584 3356 38b2eca13553190ac120dfc15b341aab.exe 90 PID 3356 wrote to memory of 2584 3356 38b2eca13553190ac120dfc15b341aab.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\38b2eca13553190ac120dfc15b341aab.exe"C:\Users\Admin\AppData\Local\Temp\38b2eca13553190ac120dfc15b341aab.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\38b2eca13553190ac120dfc15b341aab.exeC:\Users\Admin\AppData\Local\Temp\38b2eca13553190ac120dfc15b341aab.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2584
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5a1524ffa0a5028268084ba08fc3479ef
SHA1e79822c490aeb529eccf902e2ce7d0e39080bf60
SHA25696f7df3300084b246d991ebc5e10f137d37a4744efc940ff8e1fdcd58879a408
SHA512ee6619253ba49128ad6e13efce5fa2ad458c5ff3157b72f8874c1c52fdb77340b938e95c7d861837872392978c85f47aed86d5acb5db66062f121928f8493f4d