Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 05:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
400bfc6233d231a53118a9f11ddf69ad.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
400bfc6233d231a53118a9f11ddf69ad.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
400bfc6233d231a53118a9f11ddf69ad.exe
-
Size
82KB
-
MD5
400bfc6233d231a53118a9f11ddf69ad
-
SHA1
37a5174a57f7bb387c4e7c3c9e9c5220a4dd2645
-
SHA256
be37204ae4f0a6c127ef7099fdad2d3d33759d1772e8e9a3ddcdb1ed7d83051a
-
SHA512
75618164c35e91c61bf8d1d9fdf566b9c9061703299c7d54a5a5dd8f913de152cdb4ac0446d193877c24416ee141038c3ac45dbc27a5d5a18dec083b5b3354f4
-
SSDEEP
1536:N/483hhXGK7iTyLLOpZnfABevpBmwsujXu+C96W0KgeY66kbrzaV:Nw8RlD7iTiKpmjwsuj3nEfLbre
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1864 400bfc6233d231a53118a9f11ddf69ad.exe -
Executes dropped EXE 1 IoCs
pid Process 1864 400bfc6233d231a53118a9f11ddf69ad.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4560 400bfc6233d231a53118a9f11ddf69ad.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4560 400bfc6233d231a53118a9f11ddf69ad.exe 1864 400bfc6233d231a53118a9f11ddf69ad.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4560 wrote to memory of 1864 4560 400bfc6233d231a53118a9f11ddf69ad.exe 16 PID 4560 wrote to memory of 1864 4560 400bfc6233d231a53118a9f11ddf69ad.exe 16 PID 4560 wrote to memory of 1864 4560 400bfc6233d231a53118a9f11ddf69ad.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\400bfc6233d231a53118a9f11ddf69ad.exe"C:\Users\Admin\AppData\Local\Temp\400bfc6233d231a53118a9f11ddf69ad.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\400bfc6233d231a53118a9f11ddf69ad.exeC:\Users\Admin\AppData\Local\Temp\400bfc6233d231a53118a9f11ddf69ad.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1864
-