Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 02:59
Behavioral task
behavioral1
Sample
45197b3ba488dd3676bc6d3d1df6a8db.exe
Resource
win7-20231129-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
45197b3ba488dd3676bc6d3d1df6a8db.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
45197b3ba488dd3676bc6d3d1df6a8db.exe
-
Size
353KB
-
MD5
45197b3ba488dd3676bc6d3d1df6a8db
-
SHA1
199f850ccac195203c0cb6b88e3a2da76bdbbe88
-
SHA256
8c95e7b9b6962c839d328f5d63d7f740209a413f5b5907eccb0430bc3bbd4e9c
-
SHA512
0deb5b1ad55e254decc1c0423cc526593247b7cea45995f1ac33eaf5b4dc5715f8eced95824b25b0c76911ad1903dba432bbf6b902ceb5c9ecf0e361296140f9
-
SSDEEP
6144:yU+wiVmF3gCG/B7lJ9iq50CROw3PLQ1YdxfsLPrPwo+:ykiMgX59B5ImDuYTfmE
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1148 45197b3ba488dd3676bc6d3d1df6a8db.exe -
Executes dropped EXE 1 IoCs
pid Process 1148 45197b3ba488dd3676bc6d3d1df6a8db.exe -
resource yara_rule behavioral2/memory/1760-0-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral2/memory/1148-14-0x0000000000400000-0x00000000004F1000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1760 45197b3ba488dd3676bc6d3d1df6a8db.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1760 45197b3ba488dd3676bc6d3d1df6a8db.exe 1148 45197b3ba488dd3676bc6d3d1df6a8db.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1148 1760 45197b3ba488dd3676bc6d3d1df6a8db.exe 17 PID 1760 wrote to memory of 1148 1760 45197b3ba488dd3676bc6d3d1df6a8db.exe 17 PID 1760 wrote to memory of 1148 1760 45197b3ba488dd3676bc6d3d1df6a8db.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\45197b3ba488dd3676bc6d3d1df6a8db.exe"C:\Users\Admin\AppData\Local\Temp\45197b3ba488dd3676bc6d3d1df6a8db.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\45197b3ba488dd3676bc6d3d1df6a8db.exeC:\Users\Admin\AppData\Local\Temp\45197b3ba488dd3676bc6d3d1df6a8db.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1148
-