Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 02:29
Behavioral task
behavioral1
Sample
76268e2deb74d5390d8936a95bca3e20.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76268e2deb74d5390d8936a95bca3e20.exe
Resource
win10v2004-20231222-en
General
-
Target
76268e2deb74d5390d8936a95bca3e20.exe
-
Size
1.3MB
-
MD5
76268e2deb74d5390d8936a95bca3e20
-
SHA1
68f20a6b67e55d1ea72b56764b2c96d97e3ad0d3
-
SHA256
e435cad9e9606fac1a4749d55f046dca4b8f28ac88fb8842fe816f7018f11a0d
-
SHA512
ddb6969daf7aa116bf11a074e0cca6e884127ac8b10949b1fa9b7bd934e74dee56ffd16b52892395d476d58efe748df3f467b8226565986fa65fa21da6173b6e
-
SSDEEP
24576:Y3aA7cR+p44saaRJdERMs1CQSyPngYoXT2rRrUjWXvaxpwLPpxl+lARvG:YvccRsfaFSqgY0Ir0gvupWRH+lA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3996 76268e2deb74d5390d8936a95bca3e20.exe -
Executes dropped EXE 1 IoCs
pid Process 3996 76268e2deb74d5390d8936a95bca3e20.exe -
resource yara_rule behavioral2/memory/3376-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x00080000000231b8-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3376 76268e2deb74d5390d8936a95bca3e20.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3376 76268e2deb74d5390d8936a95bca3e20.exe 3996 76268e2deb74d5390d8936a95bca3e20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3376 wrote to memory of 3996 3376 76268e2deb74d5390d8936a95bca3e20.exe 84 PID 3376 wrote to memory of 3996 3376 76268e2deb74d5390d8936a95bca3e20.exe 84 PID 3376 wrote to memory of 3996 3376 76268e2deb74d5390d8936a95bca3e20.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\76268e2deb74d5390d8936a95bca3e20.exe"C:\Users\Admin\AppData\Local\Temp\76268e2deb74d5390d8936a95bca3e20.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\76268e2deb74d5390d8936a95bca3e20.exeC:\Users\Admin\AppData\Local\Temp\76268e2deb74d5390d8936a95bca3e20.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3996
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d7eba0a34fb53d1d9be9598db22c9c49
SHA12980c51a97251953da48f55ea115d6cbf3aaba02
SHA256442d906895baef05d95c2f1ab0a8c0e7fb77136fe983963795bc2a943428751e
SHA5126d3978916ce254c82f6241b849b38c6f6143c4b7fd1279d951efa1d67107f48c23793eed3c5cd76425ea4c830ec82917eedaf0196f8d18e6ecff14dc7793fb89