Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 09:22
Behavioral task
behavioral1
Sample
4df0cfe9fcdf8c9fb535cf2d87c6e99d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4df0cfe9fcdf8c9fb535cf2d87c6e99d.exe
Resource
win10v2004-20231215-en
General
-
Target
4df0cfe9fcdf8c9fb535cf2d87c6e99d.exe
-
Size
10.6MB
-
MD5
4df0cfe9fcdf8c9fb535cf2d87c6e99d
-
SHA1
b1d22ad49f522931521df428032236b940f4024b
-
SHA256
ac7e6d09082a0330afee877679b03067d5f91e45fc40d1e5467bf924b5692ac2
-
SHA512
bd5974693b505b8dd2d6570c8bf4b7420bb9cba887c73d9e3bb054684d63cf17bb44185206932d46ded2ca3b59dbe26550ef0d44e0c73ce9a7b75c5bb85c537a
-
SSDEEP
196608:PfcAB8tGXFW1BTtNDZXFWVE5tGGEXFW1BTtNDZXFWD:ncACrNDnhFrNDK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4572 4df0cfe9fcdf8c9fb535cf2d87c6e99d.exe -
Executes dropped EXE 1 IoCs
pid Process 4572 4df0cfe9fcdf8c9fb535cf2d87c6e99d.exe -
resource yara_rule behavioral2/memory/1232-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x00060000000231f9-11.dat upx behavioral2/memory/4572-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1232 4df0cfe9fcdf8c9fb535cf2d87c6e99d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1232 4df0cfe9fcdf8c9fb535cf2d87c6e99d.exe 4572 4df0cfe9fcdf8c9fb535cf2d87c6e99d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1232 wrote to memory of 4572 1232 4df0cfe9fcdf8c9fb535cf2d87c6e99d.exe 90 PID 1232 wrote to memory of 4572 1232 4df0cfe9fcdf8c9fb535cf2d87c6e99d.exe 90 PID 1232 wrote to memory of 4572 1232 4df0cfe9fcdf8c9fb535cf2d87c6e99d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4df0cfe9fcdf8c9fb535cf2d87c6e99d.exe"C:\Users\Admin\AppData\Local\Temp\4df0cfe9fcdf8c9fb535cf2d87c6e99d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\4df0cfe9fcdf8c9fb535cf2d87c6e99d.exeC:\Users\Admin\AppData\Local\Temp\4df0cfe9fcdf8c9fb535cf2d87c6e99d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4572
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5846a12d16e63d68c49c0df18e2eae1f8
SHA1e6169c034a1938711b524d8e6c574efe418ed172
SHA256456f0c92e2e44734717eccac205e638b15e03f0f6ba3ea056cf28ff3410c448e
SHA5121261fe746d62f69e8af7281b40cc222ac1f60c5ac62806707e509dcf6058ff4fe395ccd355f3ef2b3a090fd316ba119bb40566b07ddd3e9e8de350a26e4d9558