Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 23:15
Behavioral task
behavioral1
Sample
3f473d975070f4d441bc8e3e36fe04fc.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f473d975070f4d441bc8e3e36fe04fc.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
3f473d975070f4d441bc8e3e36fe04fc.exe
-
Size
2.9MB
-
MD5
3f473d975070f4d441bc8e3e36fe04fc
-
SHA1
399493649b9093306335b7041f434950131eac1d
-
SHA256
49e7877d49d90e7ce2eca370c69fde5f9ddcd685e3ae91e877ccd7ad57f2fead
-
SHA512
0932e309635de54998528fe70edd38886b8ab0b810d21e69a35d68b16a1ef8a395e697ee552352435024cd6c12005f20748b215125494da8a0a319b06d54c913
-
SSDEEP
49152:hxybpjyzBRi5Po2E1+gD5EBP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:hAljcRYpEsgFEBgg3gnl/IVUs1jePs
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4032 3f473d975070f4d441bc8e3e36fe04fc.exe -
Executes dropped EXE 1 IoCs
pid Process 4032 3f473d975070f4d441bc8e3e36fe04fc.exe -
resource yara_rule behavioral2/memory/4516-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/4032-12-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4516 3f473d975070f4d441bc8e3e36fe04fc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4516 3f473d975070f4d441bc8e3e36fe04fc.exe 4032 3f473d975070f4d441bc8e3e36fe04fc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4516 wrote to memory of 4032 4516 3f473d975070f4d441bc8e3e36fe04fc.exe 19 PID 4516 wrote to memory of 4032 4516 3f473d975070f4d441bc8e3e36fe04fc.exe 19 PID 4516 wrote to memory of 4032 4516 3f473d975070f4d441bc8e3e36fe04fc.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f473d975070f4d441bc8e3e36fe04fc.exe"C:\Users\Admin\AppData\Local\Temp\3f473d975070f4d441bc8e3e36fe04fc.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\3f473d975070f4d441bc8e3e36fe04fc.exeC:\Users\Admin\AppData\Local\Temp\3f473d975070f4d441bc8e3e36fe04fc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4032
-