Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
63dcda7d9417a45699bd9fe570d2f14c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63dcda7d9417a45699bd9fe570d2f14c.exe
Resource
win10v2004-20231215-en
General
-
Target
63dcda7d9417a45699bd9fe570d2f14c.exe
-
Size
82KB
-
MD5
63dcda7d9417a45699bd9fe570d2f14c
-
SHA1
cf0eaa0a86b1cac45c94318aefbdba4bd1d8f0fe
-
SHA256
176797ddcb45d4a7231bcedd2a906f451dd494eea84dd8542ae768a476cfaad2
-
SHA512
09f04a0723551cac4ed79c6984003bd58494da8a3769c51ebe1abfcd5898e2f509c159066342323cab4e1be22f6991cb3e4a06de64d0d448f35223c5839bc958
-
SSDEEP
1536:5ZD5a7EzY0PMk1xmRxd+VEkhRDCmcsJxS5kt1KrjYI0X0Ur:5ZNawM0PLmRxi5hVZckxbtkcI0EUr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2308 63dcda7d9417a45699bd9fe570d2f14c.exe -
Executes dropped EXE 1 IoCs
pid Process 2308 63dcda7d9417a45699bd9fe570d2f14c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 976 63dcda7d9417a45699bd9fe570d2f14c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 976 63dcda7d9417a45699bd9fe570d2f14c.exe 2308 63dcda7d9417a45699bd9fe570d2f14c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 976 wrote to memory of 2308 976 63dcda7d9417a45699bd9fe570d2f14c.exe 87 PID 976 wrote to memory of 2308 976 63dcda7d9417a45699bd9fe570d2f14c.exe 87 PID 976 wrote to memory of 2308 976 63dcda7d9417a45699bd9fe570d2f14c.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\63dcda7d9417a45699bd9fe570d2f14c.exe"C:\Users\Admin\AppData\Local\Temp\63dcda7d9417a45699bd9fe570d2f14c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\63dcda7d9417a45699bd9fe570d2f14c.exeC:\Users\Admin\AppData\Local\Temp\63dcda7d9417a45699bd9fe570d2f14c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2308
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5821552943afe28e96ff087e6a0f1e402
SHA1b76ea97d19d1fdd48a389e97888e92a1a1af47e8
SHA25667ad31a8bb8bb7f8b5e29e745f498566342f14a9c58fa0ed799c63305a27e2bb
SHA51201e5f9016c18064f44c69af6ba3f47ffda0ec89f4aaa538c3978e35195dfed2ac28f1b62e09976421bb1a4d55ddbcdc290ab03678f4779d1a3227273b94fa210