Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
216s -
max time network
239s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 14:40
Behavioral task
behavioral1
Sample
3a190dde3dfc8caa8895335cc5ce9938.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a190dde3dfc8caa8895335cc5ce9938.exe
Resource
win10v2004-20231215-en
General
-
Target
3a190dde3dfc8caa8895335cc5ce9938.exe
-
Size
10.2MB
-
MD5
3a190dde3dfc8caa8895335cc5ce9938
-
SHA1
5371b3f90439e0b8932ccfc28041c149e860189e
-
SHA256
81fb48422311bec63e73b86e48165a6342256d4e112c58ac199fdeb2f08e1213
-
SHA512
fcd0c42e7ec6a89f12437cd98603e779beba3c4a0c230ac2bef2187c186bf1694c47f74db64625ce69258ffccd1f1e5a635442604dacc1e03cdd1b2b8bee8a85
-
SSDEEP
98304:5+TST0TJoD5BZpst30g2yOEjjs9/g31JtSpDd0uxhF7PY30g2yOEjjs9/g3:ImR5BX9ZUju/EJtMOujFrBZUju/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4972 3a190dde3dfc8caa8895335cc5ce9938.exe -
Executes dropped EXE 1 IoCs
pid Process 4972 3a190dde3dfc8caa8895335cc5ce9938.exe -
resource yara_rule behavioral2/memory/3604-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral2/files/0x0009000000023137-12.dat upx behavioral2/memory/4972-14-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3604 3a190dde3dfc8caa8895335cc5ce9938.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3604 3a190dde3dfc8caa8895335cc5ce9938.exe 4972 3a190dde3dfc8caa8895335cc5ce9938.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3604 wrote to memory of 4972 3604 3a190dde3dfc8caa8895335cc5ce9938.exe 92 PID 3604 wrote to memory of 4972 3604 3a190dde3dfc8caa8895335cc5ce9938.exe 92 PID 3604 wrote to memory of 4972 3604 3a190dde3dfc8caa8895335cc5ce9938.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a190dde3dfc8caa8895335cc5ce9938.exe"C:\Users\Admin\AppData\Local\Temp\3a190dde3dfc8caa8895335cc5ce9938.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\3a190dde3dfc8caa8895335cc5ce9938.exeC:\Users\Admin\AppData\Local\Temp\3a190dde3dfc8caa8895335cc5ce9938.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4972
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD58a0472e78284f5d06cc8de6cd4779d44
SHA15d5e5f645cb1a898ed3f94f60aef782b56449a1a
SHA256ce9b261d8a39a679c6e887535740b50f1943b1698d31da6ee87b66bd6b7d5926
SHA5124e750712e11cbbc54aa45e685aec3c06702c60b8c614b5660b8c762e94d1c447493c8584c9900dab4f1a5363f9941cbe8f237c3a6bc0556370f4664d3f8c5b4e