Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 14:00

General

  • Target

    38fb4e2e554987e3385470f694ec1f47.exe

  • Size

    57KB

  • MD5

    38fb4e2e554987e3385470f694ec1f47

  • SHA1

    5b90e9e0117f2338ce5259491d7f641dbbbeef50

  • SHA256

    5b4d80e66ae2803af5015c7b105247fa0a12953381896e3ef0a93c39b4556951

  • SHA512

    db3af8593bd908c066c0be0cc587c27c36bb188bf21037d6c89cdfd2bf54677cbd5c208b3c81d8320d8920eee446a0a55012d0d6f1b1f2047e05b4999f66f140

  • SSDEEP

    1536:h8ml7kajLRvxP/Ph8o4kUasb41x4jq9m7J:KeII3HPmS6M1x4jJ9

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38fb4e2e554987e3385470f694ec1f47.exe
    "C:\Users\Admin\AppData\Local\Temp\38fb4e2e554987e3385470f694ec1f47.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3468
    • C:\Users\Admin\AppData\Local\Temp\38fb4e2e554987e3385470f694ec1f47.exe
      C:\Users\Admin\AppData\Local\Temp\38fb4e2e554987e3385470f694ec1f47.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2316

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\38fb4e2e554987e3385470f694ec1f47.exe

    Filesize

    57KB

    MD5

    e3f1ee0e8c248f30099d6c38c1f555d4

    SHA1

    56c11c73d74de11d132b8b8cb3aa3f8b23426d0a

    SHA256

    39cf218047a63369c06c22eb57183d30a52b688d1fb6cf397e0acd3743c07097

    SHA512

    797a94cd3f46dd1ebae88c8851646783b4c1bbe6a27507f8ff3b1f1498bd4e8de06f81c8e311d9fb2e69a86b7ec9350aabc4b424708683e5ec8f08e76edc2825

  • memory/2316-13-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2316-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2316-25-0x0000000004D80000-0x0000000004D9B000-memory.dmp

    Filesize

    108KB

  • memory/2316-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2316-14-0x0000000001500000-0x000000000152C000-memory.dmp

    Filesize

    176KB

  • memory/2316-26-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3468-0-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3468-1-0x00000000001B0000-0x00000000001DC000-memory.dmp

    Filesize

    176KB

  • memory/3468-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3468-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB