Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 00:40
Behavioral task
behavioral1
Sample
6673a39c54943d413cea158f0268542c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6673a39c54943d413cea158f0268542c.exe
Resource
win10v2004-20231222-en
General
-
Target
6673a39c54943d413cea158f0268542c.exe
-
Size
5.8MB
-
MD5
6673a39c54943d413cea158f0268542c
-
SHA1
56bcbb80a5794885b64f39ca6dcac14d7111970d
-
SHA256
7fab6caf09674636863dab788e1e1d2c27e29299d6eac3f534268d28d369d276
-
SHA512
6b3987ec92b172db83167dac7d7cfb0769a8a65630736715d596cbd165439ef44404ec6409f7a53c0a38546304c46d021321a3947c464f15918951b217fa19a3
-
SSDEEP
98304:rYZkLVts5C+3Hau42c1joCjMPkNwk6lz93Ho+dhWfsQxq4GlxOHau42c1joCjMP3:dtR0auq1jI86d93HYfsQs4Gl2auq1jIH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2172 6673a39c54943d413cea158f0268542c.exe -
Executes dropped EXE 1 IoCs
pid Process 2172 6673a39c54943d413cea158f0268542c.exe -
resource yara_rule behavioral2/memory/3480-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/2172-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000600000001e5df-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3480 6673a39c54943d413cea158f0268542c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3480 6673a39c54943d413cea158f0268542c.exe 2172 6673a39c54943d413cea158f0268542c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3480 wrote to memory of 2172 3480 6673a39c54943d413cea158f0268542c.exe 87 PID 3480 wrote to memory of 2172 3480 6673a39c54943d413cea158f0268542c.exe 87 PID 3480 wrote to memory of 2172 3480 6673a39c54943d413cea158f0268542c.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6673a39c54943d413cea158f0268542c.exe"C:\Users\Admin\AppData\Local\Temp\6673a39c54943d413cea158f0268542c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\6673a39c54943d413cea158f0268542c.exeC:\Users\Admin\AppData\Local\Temp\6673a39c54943d413cea158f0268542c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2172
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD5201ce9b61fe74c5c98d3b0902809529c
SHA1edbbef4a59c26f5795a4112dbe5a5ba3b355acbe
SHA2563dcc9e4ff02ec16bf53d11791641f0ce1246320ae98bd3c5a5b39ce3b4571beb
SHA5120fda8ff23b53f40cf4442c8cd3c3976caea05ec4239b654050f266b07ffab377af59269e3a7f33a6f24c253bf90713d76df8f664fa4113dd3b800392decb65dc