Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/01/2024, 16:47

General

  • Target

    6822a845a256fb94337e2f1273d0fc28.exe

  • Size

    82KB

  • MD5

    6822a845a256fb94337e2f1273d0fc28

  • SHA1

    2b6c7390798b2e12ecac919b138c6cc46aa9bb2e

  • SHA256

    b4d125e44c6a5d8216f0375f749f261bdc031ded9a8b396dcb6f61729b51e33a

  • SHA512

    5607f8e0f8ff75bcf1e968d25f72a15ee030811a641a14dcbdb68a8ee640f2938675d4a52759e2fe84102f40b702a102487cf52ec41085da400af48e0c5fc62d

  • SSDEEP

    1536:mVZEQZT1U7lr+FJoIA/XQ7Xgx4Pg2RAWmqfL8xeg+Ane1EUzbv0S0EA5OEcMp:mVZE6T1UpgKIxXgx4PgyAG1gAtzbv0SG

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6822a845a256fb94337e2f1273d0fc28.exe
    "C:\Users\Admin\AppData\Local\Temp\6822a845a256fb94337e2f1273d0fc28.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:332
    • C:\Users\Admin\AppData\Local\Temp\6822a845a256fb94337e2f1273d0fc28.exe
      C:\Users\Admin\AppData\Local\Temp\6822a845a256fb94337e2f1273d0fc28.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2808

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6822a845a256fb94337e2f1273d0fc28.exe

    Filesize

    82KB

    MD5

    111b9367aa69d31b344ac2ad2d2a50d0

    SHA1

    d6227b1a2933592f5c50e3ed68acf0b48b4e73cc

    SHA256

    defce073a983dd568738616f1955a998dc7362dcb1afecfa9cd9a8dd443b2992

    SHA512

    d6686e8082d8eb5eed0746d00aae8ba65a8ccb11568e65b1cb11aaba5fa4c80d5086e27c1911e3b60677a1289c5da98b47f9d33715e7fa7f1e38255ac34f0515

  • memory/332-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/332-1-0x0000000001430000-0x000000000145F000-memory.dmp

    Filesize

    188KB

  • memory/332-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/332-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2808-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2808-15-0x00000000000E0000-0x000000000010F000-memory.dmp

    Filesize

    188KB

  • memory/2808-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2808-22-0x0000000001500000-0x000000000151B000-memory.dmp

    Filesize

    108KB