Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
705b94fc30bcc70f90a3219a40bf42ac.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
705b94fc30bcc70f90a3219a40bf42ac.exe
Resource
win10v2004-20231215-en
General
-
Target
705b94fc30bcc70f90a3219a40bf42ac.exe
-
Size
82KB
-
MD5
705b94fc30bcc70f90a3219a40bf42ac
-
SHA1
bed2d247695e92e1479a4832afa07d7aac58895a
-
SHA256
bd96cdeea8006cee78bf25e28c81bfacc3752d9c1074bee9d7cdc0fced691653
-
SHA512
5552b1c27e338279d2e2e5098e0deb59d5eb83e2b2262d52c85076871a9e80b77ab3159fa2372305719b40e7af6d899112adcd9edbacef2a9589d4e1cdb68384
-
SSDEEP
1536:EL9ySzAfZ1ciWscEecAUH+XWwzoHWSHulto1Retm9RLbFU2G6VciM:EpxzALpTiWicSLf49RHveB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1636 705b94fc30bcc70f90a3219a40bf42ac.exe -
Executes dropped EXE 1 IoCs
pid Process 1636 705b94fc30bcc70f90a3219a40bf42ac.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3456 705b94fc30bcc70f90a3219a40bf42ac.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3456 705b94fc30bcc70f90a3219a40bf42ac.exe 1636 705b94fc30bcc70f90a3219a40bf42ac.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3456 wrote to memory of 1636 3456 705b94fc30bcc70f90a3219a40bf42ac.exe 87 PID 3456 wrote to memory of 1636 3456 705b94fc30bcc70f90a3219a40bf42ac.exe 87 PID 3456 wrote to memory of 1636 3456 705b94fc30bcc70f90a3219a40bf42ac.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\705b94fc30bcc70f90a3219a40bf42ac.exe"C:\Users\Admin\AppData\Local\Temp\705b94fc30bcc70f90a3219a40bf42ac.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\705b94fc30bcc70f90a3219a40bf42ac.exeC:\Users\Admin\AppData\Local\Temp\705b94fc30bcc70f90a3219a40bf42ac.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1636
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5b48b12d5ced26cf2be3c591cb7085c35
SHA1e0d041b9d7a0e330192d7e032ab8bda49791fe2d
SHA256a07c23e1006ad59feb7bf124073709cfed368df59b6c70c1fddde071717cd024
SHA512d08d85a8ed5a61fbfd346bb52136a87229675d1617b4daff594756465250a9bf3ef3ee8922d4c990c84aa764c2efe27a8b69f5503650e9c5ec85de85cb0c9de5