Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
38fb4e2e554987e3385470f694ec1f47.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38fb4e2e554987e3385470f694ec1f47.exe
Resource
win10v2004-20231215-en
General
-
Target
38fb4e2e554987e3385470f694ec1f47.exe
-
Size
57KB
-
MD5
38fb4e2e554987e3385470f694ec1f47
-
SHA1
5b90e9e0117f2338ce5259491d7f641dbbbeef50
-
SHA256
5b4d80e66ae2803af5015c7b105247fa0a12953381896e3ef0a93c39b4556951
-
SHA512
db3af8593bd908c066c0be0cc587c27c36bb188bf21037d6c89cdfd2bf54677cbd5c208b3c81d8320d8920eee446a0a55012d0d6f1b1f2047e05b4999f66f140
-
SSDEEP
1536:h8ml7kajLRvxP/Ph8o4kUasb41x4jq9m7J:KeII3HPmS6M1x4jJ9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2316 38fb4e2e554987e3385470f694ec1f47.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 38fb4e2e554987e3385470f694ec1f47.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3468 38fb4e2e554987e3385470f694ec1f47.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3468 38fb4e2e554987e3385470f694ec1f47.exe 2316 38fb4e2e554987e3385470f694ec1f47.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3468 wrote to memory of 2316 3468 38fb4e2e554987e3385470f694ec1f47.exe 91 PID 3468 wrote to memory of 2316 3468 38fb4e2e554987e3385470f694ec1f47.exe 91 PID 3468 wrote to memory of 2316 3468 38fb4e2e554987e3385470f694ec1f47.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\38fb4e2e554987e3385470f694ec1f47.exe"C:\Users\Admin\AppData\Local\Temp\38fb4e2e554987e3385470f694ec1f47.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\38fb4e2e554987e3385470f694ec1f47.exeC:\Users\Admin\AppData\Local\Temp\38fb4e2e554987e3385470f694ec1f47.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2316
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5e3f1ee0e8c248f30099d6c38c1f555d4
SHA156c11c73d74de11d132b8b8cb3aa3f8b23426d0a
SHA25639cf218047a63369c06c22eb57183d30a52b688d1fb6cf397e0acd3743c07097
SHA512797a94cd3f46dd1ebae88c8851646783b4c1bbe6a27507f8ff3b1f1498bd4e8de06f81c8e311d9fb2e69a86b7ec9350aabc4b424708683e5ec8f08e76edc2825