Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
5659def2dd9559275955828e361bebda.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5659def2dd9559275955828e361bebda.exe
Resource
win10v2004-20231215-en
General
-
Target
5659def2dd9559275955828e361bebda.exe
-
Size
82KB
-
MD5
5659def2dd9559275955828e361bebda
-
SHA1
bfbb55b338378bd7fa38effafd12263ea5a65295
-
SHA256
800b0bff73242a4fb9c36db1dd9404f9c307bc2850bf8e93b393e4db28c90c2c
-
SHA512
31d857d59e053cc2bcca596ee3d8574f6430851146862a28af1fbb052eade4b8b42bbba631703fb125584afedd58f3b3d414e824617d24eb98cf0b3a8817252b
-
SSDEEP
1536:BXcTUbi7XihazQecCgJnaynaH6S2IVEoyghLwLK8ZtzZCnJSKzcz8Fv/g:BXpuS8AN/nBS2IGo/ULKoKcAC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1860 5659def2dd9559275955828e361bebda.exe -
Executes dropped EXE 1 IoCs
pid Process 1860 5659def2dd9559275955828e361bebda.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2188 5659def2dd9559275955828e361bebda.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2188 5659def2dd9559275955828e361bebda.exe 1860 5659def2dd9559275955828e361bebda.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1860 2188 5659def2dd9559275955828e361bebda.exe 89 PID 2188 wrote to memory of 1860 2188 5659def2dd9559275955828e361bebda.exe 89 PID 2188 wrote to memory of 1860 2188 5659def2dd9559275955828e361bebda.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5659def2dd9559275955828e361bebda.exe"C:\Users\Admin\AppData\Local\Temp\5659def2dd9559275955828e361bebda.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\5659def2dd9559275955828e361bebda.exeC:\Users\Admin\AppData\Local\Temp\5659def2dd9559275955828e361bebda.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1860
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD520177ea021558dbc8c5e8792688347bd
SHA1a06dbb8f4fe3c93550b0141b34af02cb1d0163f5
SHA2564ec5cb502dc6faddbb5f97ee3545c16125b8f9781914722ce40e1be99917516e
SHA512a7f6a1404c93414eb1be55c8b6b062b2cf3229ba5783566e78fe21078865424467c004224d70c03ca40082145b3b99cfbadaeb05f5c56be923a806cdffcd30f5