Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 00:59
Behavioral task
behavioral1
Sample
641162415d1e259200e0712455b2d70f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
641162415d1e259200e0712455b2d70f.exe
Resource
win10v2004-20231215-en
General
-
Target
641162415d1e259200e0712455b2d70f.exe
-
Size
1.3MB
-
MD5
641162415d1e259200e0712455b2d70f
-
SHA1
311b7479c5dd579ff38bceed7f1f3c82cbeb8b47
-
SHA256
1a40f83a89c2279e246e8a9491b58f8e4d003ad91e84152840671b8b73515451
-
SHA512
b84e5e2978cdc83a63bdd079efc7e25260483444117a1c0fed2fb2f212e71d36993b83612043b097d6b2380d65d4f62ad4821643a213f20e297d9c38f46d3e7d
-
SSDEEP
24576:a1ivEd+KGeswKE18H99/JZyCopFIn3/hFLE7n6M/gt7Oz5nCGgvvG:UiEdewKQ8dxKJpa5FLQ6ltok
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1856 641162415d1e259200e0712455b2d70f.exe -
Executes dropped EXE 1 IoCs
pid Process 1856 641162415d1e259200e0712455b2d70f.exe -
resource yara_rule behavioral2/memory/2840-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000700000002310d-12.dat upx behavioral2/memory/1856-13-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2840 641162415d1e259200e0712455b2d70f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2840 641162415d1e259200e0712455b2d70f.exe 1856 641162415d1e259200e0712455b2d70f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2840 wrote to memory of 1856 2840 641162415d1e259200e0712455b2d70f.exe 87 PID 2840 wrote to memory of 1856 2840 641162415d1e259200e0712455b2d70f.exe 87 PID 2840 wrote to memory of 1856 2840 641162415d1e259200e0712455b2d70f.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\641162415d1e259200e0712455b2d70f.exe"C:\Users\Admin\AppData\Local\Temp\641162415d1e259200e0712455b2d70f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\641162415d1e259200e0712455b2d70f.exeC:\Users\Admin\AppData\Local\Temp\641162415d1e259200e0712455b2d70f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1856
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD570e02feeb1c2b4b881a8a7f0af836516
SHA1913d0eb275be92ef6e4fd79de0a2c9b8a1ddad42
SHA256f0171dc95b8cf89d8fda369ca7cf19c9414b997d65318e3e252643de5507430a
SHA512abf2af6ef4f3f9a33abaa400e102a90025c24c01b95ae1ad0dbea9f7300b4044e3d1084d15e5c4f60e7b9a6ac40bd3e22e2beb3da18c7be21ccb6d13cc6621de