Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 16:47
Static task
static1
Behavioral task
behavioral1
Sample
6822a845a256fb94337e2f1273d0fc28.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6822a845a256fb94337e2f1273d0fc28.exe
Resource
win10v2004-20231215-en
General
-
Target
6822a845a256fb94337e2f1273d0fc28.exe
-
Size
82KB
-
MD5
6822a845a256fb94337e2f1273d0fc28
-
SHA1
2b6c7390798b2e12ecac919b138c6cc46aa9bb2e
-
SHA256
b4d125e44c6a5d8216f0375f749f261bdc031ded9a8b396dcb6f61729b51e33a
-
SHA512
5607f8e0f8ff75bcf1e968d25f72a15ee030811a641a14dcbdb68a8ee640f2938675d4a52759e2fe84102f40b702a102487cf52ec41085da400af48e0c5fc62d
-
SSDEEP
1536:mVZEQZT1U7lr+FJoIA/XQ7Xgx4Pg2RAWmqfL8xeg+Ane1EUzbv0S0EA5OEcMp:mVZE6T1UpgKIxXgx4PgyAG1gAtzbv0SG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2808 6822a845a256fb94337e2f1273d0fc28.exe -
Executes dropped EXE 1 IoCs
pid Process 2808 6822a845a256fb94337e2f1273d0fc28.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 332 6822a845a256fb94337e2f1273d0fc28.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 332 6822a845a256fb94337e2f1273d0fc28.exe 2808 6822a845a256fb94337e2f1273d0fc28.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 332 wrote to memory of 2808 332 6822a845a256fb94337e2f1273d0fc28.exe 87 PID 332 wrote to memory of 2808 332 6822a845a256fb94337e2f1273d0fc28.exe 87 PID 332 wrote to memory of 2808 332 6822a845a256fb94337e2f1273d0fc28.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6822a845a256fb94337e2f1273d0fc28.exe"C:\Users\Admin\AppData\Local\Temp\6822a845a256fb94337e2f1273d0fc28.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Users\Admin\AppData\Local\Temp\6822a845a256fb94337e2f1273d0fc28.exeC:\Users\Admin\AppData\Local\Temp\6822a845a256fb94337e2f1273d0fc28.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2808
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5111b9367aa69d31b344ac2ad2d2a50d0
SHA1d6227b1a2933592f5c50e3ed68acf0b48b4e73cc
SHA256defce073a983dd568738616f1955a998dc7362dcb1afecfa9cd9a8dd443b2992
SHA512d6686e8082d8eb5eed0746d00aae8ba65a8ccb11568e65b1cb11aaba5fa4c80d5086e27c1911e3b60677a1289c5da98b47f9d33715e7fa7f1e38255ac34f0515