Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 19:41
Behavioral task
behavioral1
Sample
444775d558666f21df34137551ea0ee0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
444775d558666f21df34137551ea0ee0.exe
Resource
win10v2004-20231215-en
General
-
Target
444775d558666f21df34137551ea0ee0.exe
-
Size
2.9MB
-
MD5
444775d558666f21df34137551ea0ee0
-
SHA1
96422e43f1df1fc182e40b24a4fd895b1f0fcd8d
-
SHA256
fef5584f38bdf9ac06ff8db27c93fc743597a775eda20c81e736153adaa53ff1
-
SHA512
b9c09886a7b7808b0c5c503308c359d50b4a09a7b7bfc6852b506240f440d76f3610be19784d16531f2f4de5cc91e5b764aad1ea238928cfdf7aa45fe389c92b
-
SSDEEP
49152:KztTDL9BSrkKgHyzk5IESmOCYXk+a+wgBf2sSQU92jNjZnbz:KlnSr5g7IENOCGk+a+wghtSUJZz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1420 444775d558666f21df34137551ea0ee0.exe -
Executes dropped EXE 1 IoCs
pid Process 1420 444775d558666f21df34137551ea0ee0.exe -
resource yara_rule behavioral2/memory/3100-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000400000001e716-12.dat upx behavioral2/memory/1420-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3100 444775d558666f21df34137551ea0ee0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3100 444775d558666f21df34137551ea0ee0.exe 1420 444775d558666f21df34137551ea0ee0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3100 wrote to memory of 1420 3100 444775d558666f21df34137551ea0ee0.exe 87 PID 3100 wrote to memory of 1420 3100 444775d558666f21df34137551ea0ee0.exe 87 PID 3100 wrote to memory of 1420 3100 444775d558666f21df34137551ea0ee0.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\444775d558666f21df34137551ea0ee0.exe"C:\Users\Admin\AppData\Local\Temp\444775d558666f21df34137551ea0ee0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\444775d558666f21df34137551ea0ee0.exeC:\Users\Admin\AppData\Local\Temp\444775d558666f21df34137551ea0ee0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1420
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
357KB
MD50cb2348810989c5ed78970d16b5ca0e7
SHA1ef1bac26d1450251ad351bfdacfd1cc59fbd1fbe
SHA2566ff13b717cdedb0bfc75d2abd3b6f0b19315e2e373b44c9f24c6f597c1408758
SHA51234220ab93a47a831a7475bfbdf4e6686e59f86eb496cad55b29836a7cb2d7463fb16b24a507d960f5fc1f73ccf1221bc91c956f693a0ed1ef5d612146a717ecb