Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 16:55
Static task
static1
Behavioral task
behavioral1
Sample
593bae6057ccc612f059d4650d951716.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
593bae6057ccc612f059d4650d951716.exe
Resource
win10v2004-20231222-en
General
-
Target
593bae6057ccc612f059d4650d951716.exe
-
Size
82KB
-
MD5
593bae6057ccc612f059d4650d951716
-
SHA1
0601674dc3768bd67ffae5494ab399413666d4af
-
SHA256
df74904d5d977bcac85aa9f1635913345774b9e6c708ae6ba405d638d1b11fef
-
SHA512
72e12abe8318a06a2d7eee7d2f243e9b54d8310ad6cd2029156179cae7362aea992adbc95722c923ecca107159fde85347d46459810364bb603d0aab23bfea02
-
SSDEEP
1536:7DHA8wKYPytS/h7tIVs2C+K25KsCO54K4+3zqtVcbfymL8WzKmZSb/y:7D7q1RtIVsF3TONCV6XIWzKmUba
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2220 593bae6057ccc612f059d4650d951716.exe -
Executes dropped EXE 1 IoCs
pid Process 2220 593bae6057ccc612f059d4650d951716.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3512 593bae6057ccc612f059d4650d951716.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3512 593bae6057ccc612f059d4650d951716.exe 2220 593bae6057ccc612f059d4650d951716.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3512 wrote to memory of 2220 3512 593bae6057ccc612f059d4650d951716.exe 90 PID 3512 wrote to memory of 2220 3512 593bae6057ccc612f059d4650d951716.exe 90 PID 3512 wrote to memory of 2220 3512 593bae6057ccc612f059d4650d951716.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\593bae6057ccc612f059d4650d951716.exe"C:\Users\Admin\AppData\Local\Temp\593bae6057ccc612f059d4650d951716.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\593bae6057ccc612f059d4650d951716.exeC:\Users\Admin\AppData\Local\Temp\593bae6057ccc612f059d4650d951716.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2220
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD50b3b493beb101d119ab71510d2b0a5c5
SHA1921a69b3390a46260362427127e94359eecf5d60
SHA256e3ee66ac5d1990a100d1f349dea8659c7736024665a2b514eff323dd31cdb326
SHA5126c153ad0ba78605516712a744c6feed509d26d63746da502cb2bcbdb86699ae47198cf60301dcde1e6002ac7e8c4800c85951d42e14e54f7d36531714522ea08