Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 09:52
Behavioral task
behavioral1
Sample
43614121d1a5593b477c5fc5c7f18f3c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43614121d1a5593b477c5fc5c7f18f3c.exe
Resource
win10v2004-20231215-en
General
-
Target
43614121d1a5593b477c5fc5c7f18f3c.exe
-
Size
2.7MB
-
MD5
43614121d1a5593b477c5fc5c7f18f3c
-
SHA1
58d2d6e3da53d5b7724acffbf421a1e1d3605bba
-
SHA256
504b5858244a4b9a6f98f54608686be8e23547682f37df5a88b84e42ea5faa1a
-
SHA512
0d204e95d5a5476ee7d1024f0428421088b777c5d558a2588e8ef00725c21e576b2e72dd35594473b5d188d56bdc97e520732208ad4f99638a9ea48a96d58052
-
SSDEEP
49152:/YOcDBQ7/3f/owhcoqvn+2L02q/ZN9R9WKLNUOJG3w0LG8Mkmf4FwZAxkdxoeR9j:Vv7/Howh4f+2WN9H7pUOJG3NXi1sqFHj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1228 43614121d1a5593b477c5fc5c7f18f3c.exe -
Executes dropped EXE 1 IoCs
pid Process 1228 43614121d1a5593b477c5fc5c7f18f3c.exe -
resource yara_rule behavioral2/memory/2148-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x0007000000023225-11.dat upx behavioral2/memory/1228-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2148 43614121d1a5593b477c5fc5c7f18f3c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2148 43614121d1a5593b477c5fc5c7f18f3c.exe 1228 43614121d1a5593b477c5fc5c7f18f3c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1228 2148 43614121d1a5593b477c5fc5c7f18f3c.exe 39 PID 2148 wrote to memory of 1228 2148 43614121d1a5593b477c5fc5c7f18f3c.exe 39 PID 2148 wrote to memory of 1228 2148 43614121d1a5593b477c5fc5c7f18f3c.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\43614121d1a5593b477c5fc5c7f18f3c.exe"C:\Users\Admin\AppData\Local\Temp\43614121d1a5593b477c5fc5c7f18f3c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\43614121d1a5593b477c5fc5c7f18f3c.exeC:\Users\Admin\AppData\Local\Temp\43614121d1a5593b477c5fc5c7f18f3c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1228
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD543f78b397d8e415d0a49f826ee5e1ae0
SHA12c7630a8e84034a231e48c607aa223030b52b5cb
SHA256cb666d04a685c4888b5379e518b44f3a45df5f49a833c2439e516a2d1142121d
SHA512b461d0fdf4f83a0679f5eade4937f5de4e110a2acf10c5b34c6491058a65509a6e5a21880b47edae968c0cabcedaec5171ff3280046b441ce3d0cd2fb67a9a3b