Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
172s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 17:48
Behavioral task
behavioral1
Sample
49a6fb26582ede0ade82e0b9f7714989.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49a6fb26582ede0ade82e0b9f7714989.exe
Resource
win10v2004-20231215-en
General
-
Target
49a6fb26582ede0ade82e0b9f7714989.exe
-
Size
56KB
-
MD5
49a6fb26582ede0ade82e0b9f7714989
-
SHA1
33a21b04eeadced2ca5b8a869b5a85091053cb83
-
SHA256
4b8a0c570746e57ed21195bc66353acf1740ad727dd5587309465ebaab79f7d5
-
SHA512
d26d96981f3feecff2665ccc928a5b08941d257f949c5e0950033dc047eedbb580905dbfe320c67af035e62e028fd3425460988aff3124c4fd8ea0b2e06c6614
-
SSDEEP
1536:ECnurieBzwDfkHWjFApNESnfbptwXf+qXKaE:EvHww2jmlfbptwX11E
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1940 49a6fb26582ede0ade82e0b9f7714989.exe -
Executes dropped EXE 1 IoCs
pid Process 1940 49a6fb26582ede0ade82e0b9f7714989.exe -
resource yara_rule behavioral2/memory/3160-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00080000000224fc-11.dat upx behavioral2/memory/1940-13-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3160 49a6fb26582ede0ade82e0b9f7714989.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3160 49a6fb26582ede0ade82e0b9f7714989.exe 1940 49a6fb26582ede0ade82e0b9f7714989.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3160 wrote to memory of 1940 3160 49a6fb26582ede0ade82e0b9f7714989.exe 91 PID 3160 wrote to memory of 1940 3160 49a6fb26582ede0ade82e0b9f7714989.exe 91 PID 3160 wrote to memory of 1940 3160 49a6fb26582ede0ade82e0b9f7714989.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\49a6fb26582ede0ade82e0b9f7714989.exe"C:\Users\Admin\AppData\Local\Temp\49a6fb26582ede0ade82e0b9f7714989.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\49a6fb26582ede0ade82e0b9f7714989.exeC:\Users\Admin\AppData\Local\Temp\49a6fb26582ede0ade82e0b9f7714989.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5a7fc2bf3165c1cb3751ad30955379094
SHA1094eea5479c0bedc227ef3721de0959216d68982
SHA256d9c36ebb9c1ba82f49a75df4c4110c6de6f0bf1f0b1155b14f8157ac82a9e519
SHA512016b1c50d64c43db61df2dac6f1b572e84415d2cad30f03ee184acaa478a725fc910183d6c1c371a0e174586856d9ea2f800e4ba465484eab5f5e0a02afd7f9b