Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 10:05
Behavioral task
behavioral1
Sample
1e9bb0b99a06617397a42ccb0bd61907.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1e9bb0b99a06617397a42ccb0bd61907.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
1e9bb0b99a06617397a42ccb0bd61907.exe
-
Size
1.3MB
-
MD5
1e9bb0b99a06617397a42ccb0bd61907
-
SHA1
26242243d645e19221f6ca800512bda7c4d6b41b
-
SHA256
26705e1edbd8eebd49dc99d4c262563c270c1f4c69a4acfa695f010700e107ef
-
SHA512
4178f5a72daa8a80ece86cd532ed3c6622818693c7bf369fa4f0be777a3078012d83b42077bdf611f5852db3e5aa61196307f3961065627005f5fab1243f9ac3
-
SSDEEP
24576:csuvMsuMd0uPvA7gn9LYfO2bWeMKi2QH97nW2g1c0LF7cisMewHfq3vG:3uksuMfsm9UeeMKIH97W2+c0LNvO0f
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 752 1e9bb0b99a06617397a42ccb0bd61907.exe -
Executes dropped EXE 1 IoCs
pid Process 752 1e9bb0b99a06617397a42ccb0bd61907.exe -
resource yara_rule behavioral2/memory/752-14-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/1744-0-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1744 1e9bb0b99a06617397a42ccb0bd61907.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1744 1e9bb0b99a06617397a42ccb0bd61907.exe 752 1e9bb0b99a06617397a42ccb0bd61907.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1744 wrote to memory of 752 1744 1e9bb0b99a06617397a42ccb0bd61907.exe 17 PID 1744 wrote to memory of 752 1744 1e9bb0b99a06617397a42ccb0bd61907.exe 17 PID 1744 wrote to memory of 752 1744 1e9bb0b99a06617397a42ccb0bd61907.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e9bb0b99a06617397a42ccb0bd61907.exe"C:\Users\Admin\AppData\Local\Temp\1e9bb0b99a06617397a42ccb0bd61907.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\1e9bb0b99a06617397a42ccb0bd61907.exeC:\Users\Admin\AppData\Local\Temp\1e9bb0b99a06617397a42ccb0bd61907.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:752
-