Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 08:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
55f67c84b61fed6711310767e828115d.exe
Resource
win7-20231215-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
55f67c84b61fed6711310767e828115d.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
55f67c84b61fed6711310767e828115d.exe
-
Size
385KB
-
MD5
55f67c84b61fed6711310767e828115d
-
SHA1
745bfe073a7b92eb36fcf82396c9fdadb19d5ee3
-
SHA256
7d7b4a2d9c2b0f0841fae69c6d747a7275296a1872cc6e402e26f7b2cd930865
-
SHA512
da00383f07592253a1a7dbcf14cc1defdb269c4af50ee3cff0fcaa4b09e78e6164aae752e80044fb680b957e953ec138373f9f8114d6b06ee01601c0e787c668
-
SSDEEP
6144:Um4l+5Po50FQMfX5W3/QXbgba4u8Wsp+eQXZ4/luM8TnyCEfPj/KJ3kattDYsHB:Ubl+JFw3igypZ20yCEj8DfHB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1076 55f67c84b61fed6711310767e828115d.exe -
Executes dropped EXE 1 IoCs
pid Process 1076 55f67c84b61fed6711310767e828115d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4808 55f67c84b61fed6711310767e828115d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4808 55f67c84b61fed6711310767e828115d.exe 1076 55f67c84b61fed6711310767e828115d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4808 wrote to memory of 1076 4808 55f67c84b61fed6711310767e828115d.exe 18 PID 4808 wrote to memory of 1076 4808 55f67c84b61fed6711310767e828115d.exe 18 PID 4808 wrote to memory of 1076 4808 55f67c84b61fed6711310767e828115d.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\55f67c84b61fed6711310767e828115d.exe"C:\Users\Admin\AppData\Local\Temp\55f67c84b61fed6711310767e828115d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\55f67c84b61fed6711310767e828115d.exeC:\Users\Admin\AppData\Local\Temp\55f67c84b61fed6711310767e828115d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1076
-