Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 19:58
Behavioral task
behavioral1
Sample
5177d198d38faa0b164ff1c5ddb8fb4c.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
5177d198d38faa0b164ff1c5ddb8fb4c.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
5177d198d38faa0b164ff1c5ddb8fb4c.exe
-
Size
11.0MB
-
MD5
5177d198d38faa0b164ff1c5ddb8fb4c
-
SHA1
e6b7703da00a0296fac0226e3ce09ce3e85020df
-
SHA256
773293e35a2c4dd1963431d0e1bf900554dfc53824149813a138182c969a98ad
-
SHA512
a33c33977b190257f3356c20e2618cacdec9e9ff38658e976ca261b56e19fb092f88a4c643c91db60a765a9b5356b3f1bb4ca8f22782aa368f6252ab3161e6ff
-
SSDEEP
98304:z9J1MLiYhXS635mCckFR+vicS43JqqeRnCd7fiNvH1VKx35mCckFR+vicS43:pAuOCS33FR+6cB+Rn07U/1c33FR+6c
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3124 5177d198d38faa0b164ff1c5ddb8fb4c.exe -
Executes dropped EXE 1 IoCs
pid Process 3124 5177d198d38faa0b164ff1c5ddb8fb4c.exe -
resource yara_rule behavioral2/memory/4644-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4644 5177d198d38faa0b164ff1c5ddb8fb4c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4644 5177d198d38faa0b164ff1c5ddb8fb4c.exe 3124 5177d198d38faa0b164ff1c5ddb8fb4c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4644 wrote to memory of 3124 4644 5177d198d38faa0b164ff1c5ddb8fb4c.exe 24 PID 4644 wrote to memory of 3124 4644 5177d198d38faa0b164ff1c5ddb8fb4c.exe 24 PID 4644 wrote to memory of 3124 4644 5177d198d38faa0b164ff1c5ddb8fb4c.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\5177d198d38faa0b164ff1c5ddb8fb4c.exe"C:\Users\Admin\AppData\Local\Temp\5177d198d38faa0b164ff1c5ddb8fb4c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\5177d198d38faa0b164ff1c5ddb8fb4c.exeC:\Users\Admin\AppData\Local\Temp\5177d198d38faa0b164ff1c5ddb8fb4c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3124
-