Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
4e88c829ebb1afa4cda7ac3c978d0d07.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e88c829ebb1afa4cda7ac3c978d0d07.exe
Resource
win10v2004-20231222-en
General
-
Target
4e88c829ebb1afa4cda7ac3c978d0d07.exe
-
Size
330KB
-
MD5
4e88c829ebb1afa4cda7ac3c978d0d07
-
SHA1
d4c28a608ed7eb55d9e10a6041ab563f9f0e53a7
-
SHA256
946dd8914bcbb40722a04d4c04dd314bb837f63164699e07ab977be181abde20
-
SHA512
b708cf6ed8833611aec48a704148949d99bc3bff9c96ed8d69aa7af2a7882e621b4c500fc61c58aa3a37a7fe357eecb745d042c5586449c4717ece4350947dac
-
SSDEEP
6144:yiWVDiFh7O/lKNi5HDneTSI5la+9sn+X6/IGC94OP8W5HDneTSI5la+9sn2:lWVDiFh7OR5SmyxX6bC/5SmyJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4480 4e88c829ebb1afa4cda7ac3c978d0d07.exe -
Executes dropped EXE 1 IoCs
pid Process 4480 4e88c829ebb1afa4cda7ac3c978d0d07.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1496 4e88c829ebb1afa4cda7ac3c978d0d07.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1496 4e88c829ebb1afa4cda7ac3c978d0d07.exe 4480 4e88c829ebb1afa4cda7ac3c978d0d07.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1496 wrote to memory of 4480 1496 4e88c829ebb1afa4cda7ac3c978d0d07.exe 91 PID 1496 wrote to memory of 4480 1496 4e88c829ebb1afa4cda7ac3c978d0d07.exe 91 PID 1496 wrote to memory of 4480 1496 4e88c829ebb1afa4cda7ac3c978d0d07.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e88c829ebb1afa4cda7ac3c978d0d07.exe"C:\Users\Admin\AppData\Local\Temp\4e88c829ebb1afa4cda7ac3c978d0d07.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\4e88c829ebb1afa4cda7ac3c978d0d07.exeC:\Users\Admin\AppData\Local\Temp\4e88c829ebb1afa4cda7ac3c978d0d07.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4480
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
330KB
MD5951cdd26c77989e6e81c8e6113bfce1f
SHA116d8a4a87bc37f931b14a8a1aefb372229c730a8
SHA25696b95517258db1e637e69bfffe3e21a8e7c18d86afaa7d772e2f4d27a7a4cd52
SHA512849e448e6c7d0342a987b337aed4bbceb86dd94919f8122227f9c81232c5a20355b178a2c70d5fdd7bdfa84e2b800b83f46704eaad5e10643929aae31ba87bd1