Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
5a781436cb8081307e4ace32a59e3d2c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5a781436cb8081307e4ace32a59e3d2c.exe
Resource
win10v2004-20231215-en
General
-
Target
5a781436cb8081307e4ace32a59e3d2c.exe
-
Size
84KB
-
MD5
5a781436cb8081307e4ace32a59e3d2c
-
SHA1
005b114c1ee2f232c5ec24d0d22286d1a7dade64
-
SHA256
2acdad3a4ccf58685bc404c5e634f756c0b10e59e3c3c369fe012ba471557292
-
SHA512
9f581309afe87c2e68fa00fa9558db557dc508a70964c74e9e3d40b4e18575f5654f496f93176e9be5293101c199edf11bb10709ca3c7b3b8594827943e5586d
-
SSDEEP
1536:zlPsb83uv8Poa9hOXbg0kyG7xXlaxZuyntizg3Uusr0418yDNUTi81fPU:zlPso3uEPrOjm1XlYtTrgBKmmc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2008 5a781436cb8081307e4ace32a59e3d2c.exe -
Executes dropped EXE 1 IoCs
pid Process 2008 5a781436cb8081307e4ace32a59e3d2c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1476 5a781436cb8081307e4ace32a59e3d2c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1476 5a781436cb8081307e4ace32a59e3d2c.exe 2008 5a781436cb8081307e4ace32a59e3d2c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2008 1476 5a781436cb8081307e4ace32a59e3d2c.exe 90 PID 1476 wrote to memory of 2008 1476 5a781436cb8081307e4ace32a59e3d2c.exe 90 PID 1476 wrote to memory of 2008 1476 5a781436cb8081307e4ace32a59e3d2c.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a781436cb8081307e4ace32a59e3d2c.exe"C:\Users\Admin\AppData\Local\Temp\5a781436cb8081307e4ace32a59e3d2c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\5a781436cb8081307e4ace32a59e3d2c.exeC:\Users\Admin\AppData\Local\Temp\5a781436cb8081307e4ace32a59e3d2c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2008
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5865633585c02b40e170e3a3cbf911122
SHA1576b416163e6fae6f3c37f3d4d6909ff24211964
SHA2563d6b87e7951b61e6412c1db1635458e0e2e29c7daf8899f7722409fe18db4d0a
SHA51294325626d687302bca5b89cfb9a04be94aba216b4048597b069ba05c3d592b669983758f6c777706fe4d2cc6898d3e5aa5500fa605c71f7c5613477e1e250b91