Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 21:30
Behavioral task
behavioral1
Sample
7870ddab25dcf8abec09d4f8423ce85f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7870ddab25dcf8abec09d4f8423ce85f.exe
Resource
win10v2004-20231222-en
General
-
Target
7870ddab25dcf8abec09d4f8423ce85f.exe
-
Size
1.3MB
-
MD5
7870ddab25dcf8abec09d4f8423ce85f
-
SHA1
d2c818a42abc698ff5036345c6bce818d5fe2fd2
-
SHA256
358b905600fd5aac7828e57e2f3366f5718a0f6b61d78de4829609303f08bad0
-
SHA512
3ca48cefda7ae4e5bcd5fc307600c36a17cb6ae14faea961e321221a9ba2e616bfc8e34416694283d8d369daa7b78dabe8b8a563a75c249e0c277bbb8f6ac855
-
SSDEEP
24576:t4wne9sWZ7tSRmjsXzMVDDKZEWXUNEYlVZlJf7oRQqOs7VvXjvG:uqe9SHXz+S6EWXf7oRQ/EVvX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2308 7870ddab25dcf8abec09d4f8423ce85f.exe -
Executes dropped EXE 1 IoCs
pid Process 2308 7870ddab25dcf8abec09d4f8423ce85f.exe -
resource yara_rule behavioral2/memory/3460-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x00080000000231f9-12.dat upx behavioral2/memory/2308-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3460 7870ddab25dcf8abec09d4f8423ce85f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3460 7870ddab25dcf8abec09d4f8423ce85f.exe 2308 7870ddab25dcf8abec09d4f8423ce85f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3460 wrote to memory of 2308 3460 7870ddab25dcf8abec09d4f8423ce85f.exe 41 PID 3460 wrote to memory of 2308 3460 7870ddab25dcf8abec09d4f8423ce85f.exe 41 PID 3460 wrote to memory of 2308 3460 7870ddab25dcf8abec09d4f8423ce85f.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\7870ddab25dcf8abec09d4f8423ce85f.exe"C:\Users\Admin\AppData\Local\Temp\7870ddab25dcf8abec09d4f8423ce85f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\7870ddab25dcf8abec09d4f8423ce85f.exeC:\Users\Admin\AppData\Local\Temp\7870ddab25dcf8abec09d4f8423ce85f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2308
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD5173ad5bc7d846d52a179e9102dbdc5fe
SHA111b320af3c0f2219b8509d0acf04a4804b443043
SHA2560e98cacf48a1438451f781ff0d45ccbe2178bce369315917b8ea8f7e16504711
SHA51237473de1682578228f68e0c88cbde010b2f4a0748d15a4b5a84c2a3b46693c370403583fdaeaa1aa3ba48d747936b235ae8e7daf36d656924e11116a29ed53ae