Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
171s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 21:46
Behavioral task
behavioral1
Sample
3f1ae38001fcd469617f98bb262c1e74.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f1ae38001fcd469617f98bb262c1e74.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
3f1ae38001fcd469617f98bb262c1e74.exe
-
Size
1.3MB
-
MD5
3f1ae38001fcd469617f98bb262c1e74
-
SHA1
d2992cb0a979f9b5f63abc85d7124d20a2ed677c
-
SHA256
65a77bc66d0cf4c305c38a883a64227d3dfaf7312075ca054ed3023b10bf1996
-
SHA512
6f0f75db11138ada7d678ae61d9467fdb4605713fdfcc8d98a3e65260cc1fb673854c2db6d91fe24f08e8a6c180487e80e2e842a0dc67e79fa627d93a437800c
-
SSDEEP
24576:M9GCIMeDTrcRJ2/710qJGHuJgvnHvXxHMtHsa///Si9ws6y2SU9/9Us:MMC8IIJjJGrXxHMN7P4R9j
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4376 3f1ae38001fcd469617f98bb262c1e74.exe -
Executes dropped EXE 1 IoCs
pid Process 4376 3f1ae38001fcd469617f98bb262c1e74.exe -
resource yara_rule behavioral2/memory/4468-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/memory/4376-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x0006000000023242-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4468 3f1ae38001fcd469617f98bb262c1e74.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4468 3f1ae38001fcd469617f98bb262c1e74.exe 4376 3f1ae38001fcd469617f98bb262c1e74.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4468 wrote to memory of 4376 4468 3f1ae38001fcd469617f98bb262c1e74.exe 88 PID 4468 wrote to memory of 4376 4468 3f1ae38001fcd469617f98bb262c1e74.exe 88 PID 4468 wrote to memory of 4376 4468 3f1ae38001fcd469617f98bb262c1e74.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f1ae38001fcd469617f98bb262c1e74.exe"C:\Users\Admin\AppData\Local\Temp\3f1ae38001fcd469617f98bb262c1e74.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\3f1ae38001fcd469617f98bb262c1e74.exeC:\Users\Admin\AppData\Local\Temp\3f1ae38001fcd469617f98bb262c1e74.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4376
-