Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
58s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 17:04
Behavioral task
behavioral1
Sample
541772b6e5616c96a1a0bbe16aa534ce.exe
Resource
win7-20231215-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
541772b6e5616c96a1a0bbe16aa534ce.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
541772b6e5616c96a1a0bbe16aa534ce.exe
-
Size
1.3MB
-
MD5
541772b6e5616c96a1a0bbe16aa534ce
-
SHA1
94c7fb2d8d0434243632297e69d93775eaaff37c
-
SHA256
d019acd81ab688a84cc056c1037abc631cfdc48668a81a0884bad09eaa9bd9dc
-
SHA512
94deb3b070601eb150ebc23f8667a69d344e18bc2b1d02dafc6c1a17ebccbe38a6bab55a58bb7aab2a622e89687ad622ae3338597ed711f7aae27846d4a70993
-
SSDEEP
24576:5ULkF9Ifu0KQU34LJi51rtQ0vlM9SZaQ8oddf+OmyXhD6FpeVWO:5ULkFiuzQoh5lauM9CaQ8yFmtsf
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2160 541772b6e5616c96a1a0bbe16aa534ce.exe -
Executes dropped EXE 1 IoCs
pid Process 2160 541772b6e5616c96a1a0bbe16aa534ce.exe -
resource yara_rule behavioral2/memory/2160-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/4756-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4756 541772b6e5616c96a1a0bbe16aa534ce.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4756 541772b6e5616c96a1a0bbe16aa534ce.exe 2160 541772b6e5616c96a1a0bbe16aa534ce.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4756 wrote to memory of 2160 4756 541772b6e5616c96a1a0bbe16aa534ce.exe 19 PID 4756 wrote to memory of 2160 4756 541772b6e5616c96a1a0bbe16aa534ce.exe 19 PID 4756 wrote to memory of 2160 4756 541772b6e5616c96a1a0bbe16aa534ce.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\541772b6e5616c96a1a0bbe16aa534ce.exe"C:\Users\Admin\AppData\Local\Temp\541772b6e5616c96a1a0bbe16aa534ce.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\541772b6e5616c96a1a0bbe16aa534ce.exeC:\Users\Admin\AppData\Local\Temp\541772b6e5616c96a1a0bbe16aa534ce.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2160
-