Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 14:10
Behavioral task
behavioral1
Sample
3949541ccb55f6d3667bd8f1f5722ea0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3949541ccb55f6d3667bd8f1f5722ea0.exe
Resource
win10v2004-20231215-en
General
-
Target
3949541ccb55f6d3667bd8f1f5722ea0.exe
-
Size
5.3MB
-
MD5
3949541ccb55f6d3667bd8f1f5722ea0
-
SHA1
3b13f5509325cffb1f372cce348bc1c39ee188e6
-
SHA256
4b087e5f871fa0ce6166440fcfaa0ebea90962bef881581e3779cb516787b527
-
SHA512
084a149f43a1720f3f162c327a7895638b9396368516685a84cb18377cd4978b5f67aca3af799ad87abe7da81c3ca612dbdba87f1488690e5751ead65126fd98
-
SSDEEP
98304:xCMyaa7N98nRJNfHj8FhX6s9CkUjHGzHbkkIKGYWlZgodk7cHj8FhX6s9CkUjHGn:Lyas/YRzfDQhhEdaYCJW0QDQhhEdaD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2116 3949541ccb55f6d3667bd8f1f5722ea0.exe -
Executes dropped EXE 1 IoCs
pid Process 2116 3949541ccb55f6d3667bd8f1f5722ea0.exe -
resource yara_rule behavioral2/memory/880-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/memory/2116-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000d000000023167-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 880 3949541ccb55f6d3667bd8f1f5722ea0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 880 3949541ccb55f6d3667bd8f1f5722ea0.exe 2116 3949541ccb55f6d3667bd8f1f5722ea0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 880 wrote to memory of 2116 880 3949541ccb55f6d3667bd8f1f5722ea0.exe 90 PID 880 wrote to memory of 2116 880 3949541ccb55f6d3667bd8f1f5722ea0.exe 90 PID 880 wrote to memory of 2116 880 3949541ccb55f6d3667bd8f1f5722ea0.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3949541ccb55f6d3667bd8f1f5722ea0.exe"C:\Users\Admin\AppData\Local\Temp\3949541ccb55f6d3667bd8f1f5722ea0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\3949541ccb55f6d3667bd8f1f5722ea0.exeC:\Users\Admin\AppData\Local\Temp\3949541ccb55f6d3667bd8f1f5722ea0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2116
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD566678fcd873b98a9eb344bb8ba87495c
SHA11dc7c0b32622a418fcec36f2bb5d6c64ac0c1f53
SHA2568018cab1ea6761702a879e80e3110788dc30f05db999f07fa2c4981229428f75
SHA512b308cd3dd0151fd34a49aa292359cd6687439b164828ec25ea80ccdea25c8068dadb24cbc7547f308620e08550e33d12820d3210b3bf0c391bc30e51b5731f47