Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
4c9a9c48847e3ac507d2b152d3e4d7b3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c9a9c48847e3ac507d2b152d3e4d7b3.exe
Resource
win10v2004-20231215-en
General
-
Target
4c9a9c48847e3ac507d2b152d3e4d7b3.exe
-
Size
84KB
-
MD5
4c9a9c48847e3ac507d2b152d3e4d7b3
-
SHA1
c03e166139744ea5739c8e126f138fee3aae22d2
-
SHA256
9538c869742f744a6843b81389fec76e71d9063f7ca99692959bf3e820ff911e
-
SHA512
6ec1cbd1980897145a95f9ba9c0f5e82ea4a24dd4f33fa18fda61d9a5bb1609e87343416a3d911b73da52b2e3450f9b7ede86d22d96b8eb4795c1aa406b9ed84
-
SSDEEP
1536:DaA70xw2qIJ8vulpDq1pSCX/IUO2JtqgZc5YCKUfiZU3+rYyMrp:Gu2qKKqY9wf2JtqgGYRxrarp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2004 4c9a9c48847e3ac507d2b152d3e4d7b3.exe -
Executes dropped EXE 1 IoCs
pid Process 2004 4c9a9c48847e3ac507d2b152d3e4d7b3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2828 4c9a9c48847e3ac507d2b152d3e4d7b3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2828 4c9a9c48847e3ac507d2b152d3e4d7b3.exe 2004 4c9a9c48847e3ac507d2b152d3e4d7b3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2004 2828 4c9a9c48847e3ac507d2b152d3e4d7b3.exe 90 PID 2828 wrote to memory of 2004 2828 4c9a9c48847e3ac507d2b152d3e4d7b3.exe 90 PID 2828 wrote to memory of 2004 2828 4c9a9c48847e3ac507d2b152d3e4d7b3.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c9a9c48847e3ac507d2b152d3e4d7b3.exe"C:\Users\Admin\AppData\Local\Temp\4c9a9c48847e3ac507d2b152d3e4d7b3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\4c9a9c48847e3ac507d2b152d3e4d7b3.exeC:\Users\Admin\AppData\Local\Temp\4c9a9c48847e3ac507d2b152d3e4d7b3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2004
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD58073533c66cb80374d8e38b414350dfc
SHA19c2666b2af327c877d450ea4da1417330b660cc8
SHA25681d958bc3514f7ebcf2b08b73b0abf5dcf12f6f4bd34af46c67e06a42de6483c
SHA5127331caa8ad345115d810fbbd880d5f43491f300dd3d5999143f6b6014b030ac90acf907d17d720b8320c341440506cdec5bbf59ba9bbea759561faf27b8c3da3