Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 13:02
Behavioral task
behavioral1
Sample
50a0461dc5082d1fa607e60aa3eb3909.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
50a0461dc5082d1fa607e60aa3eb3909.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
50a0461dc5082d1fa607e60aa3eb3909.exe
-
Size
1.3MB
-
MD5
50a0461dc5082d1fa607e60aa3eb3909
-
SHA1
8797123f7ce92e0379c3dfed596810f5911b76ec
-
SHA256
79299bb57e1c93da5f037b968610eedd70792c408899347c42e24da57a92c33d
-
SHA512
3cbad362f5167ec13d0c04e6bbf282f617285ba531de6b70bd46e602aab224f4ee04ca38f1bae98ec23948aad1ecd97ad9c099c487e0a58d25f0a07247bde5fa
-
SSDEEP
24576:6/jBVZs8eUzSmTzhHZKri0erFsYYetoWtdRxKZ79xj01ZvG:KjBle0Pki0erFsYYehtzxQ5R01
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2844 50a0461dc5082d1fa607e60aa3eb3909.exe -
Executes dropped EXE 1 IoCs
pid Process 2844 50a0461dc5082d1fa607e60aa3eb3909.exe -
resource yara_rule behavioral2/memory/2908-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/2844-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2908 50a0461dc5082d1fa607e60aa3eb3909.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2908 50a0461dc5082d1fa607e60aa3eb3909.exe 2844 50a0461dc5082d1fa607e60aa3eb3909.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2844 2908 50a0461dc5082d1fa607e60aa3eb3909.exe 18 PID 2908 wrote to memory of 2844 2908 50a0461dc5082d1fa607e60aa3eb3909.exe 18 PID 2908 wrote to memory of 2844 2908 50a0461dc5082d1fa607e60aa3eb3909.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\50a0461dc5082d1fa607e60aa3eb3909.exe"C:\Users\Admin\AppData\Local\Temp\50a0461dc5082d1fa607e60aa3eb3909.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\50a0461dc5082d1fa607e60aa3eb3909.exeC:\Users\Admin\AppData\Local\Temp\50a0461dc5082d1fa607e60aa3eb3909.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2844
-