Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
381ff45f6cda9454dbfb1af003f0be86.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
381ff45f6cda9454dbfb1af003f0be86.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
381ff45f6cda9454dbfb1af003f0be86.exe
-
Size
249KB
-
MD5
381ff45f6cda9454dbfb1af003f0be86
-
SHA1
0fde1b733fb98ea1c2450f745cc6e6f3f460c3ca
-
SHA256
4caf01ecb8dd5e3c68a9ce93196a4ed74b6e7c843ff56707ef8f7c84afcb5d05
-
SHA512
05716acc769f00b3dda4a736d65e07d5e22fb72fff06183a323325d9571345931a967fbd0a4d52644f9fb37b27f43cd7ad5b0c141e20b8fdab37388cb1f4e971
-
SSDEEP
6144:QZQI7dkQqHNbbc/8Zz9DRAQW+Y7zk4NU9L/b:QZQIaptM/8J9qbI9L/b
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4680 Windows Aues -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Delete.bat 381ff45f6cda9454dbfb1af003f0be86.exe File created C:\Windows\Windows Aues 381ff45f6cda9454dbfb1af003f0be86.exe File opened for modification C:\Windows\Windows Aues 381ff45f6cda9454dbfb1af003f0be86.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4680 Windows Aues -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4748 wrote to memory of 4688 4748 381ff45f6cda9454dbfb1af003f0be86.exe 38 PID 4748 wrote to memory of 4688 4748 381ff45f6cda9454dbfb1af003f0be86.exe 38 PID 4748 wrote to memory of 4688 4748 381ff45f6cda9454dbfb1af003f0be86.exe 38 PID 4680 wrote to memory of 4496 4680 Windows Aues 39 PID 4680 wrote to memory of 4496 4680 Windows Aues 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\381ff45f6cda9454dbfb1af003f0be86.exe"C:\Users\Admin\AppData\Local\Temp\381ff45f6cda9454dbfb1af003f0be86.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Delete.bat2⤵PID:4688
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"1⤵PID:4496
-
C:\Windows\Windows Aues"C:\Windows\Windows Aues"1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4680