Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
89s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 20:08
Behavioral task
behavioral1
Sample
7847188494e7b747500620a1f65e9743.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7847188494e7b747500620a1f65e9743.exe
Resource
win10v2004-20231215-en
General
-
Target
7847188494e7b747500620a1f65e9743.exe
-
Size
1.3MB
-
MD5
7847188494e7b747500620a1f65e9743
-
SHA1
6265163f510aecd2595ab1816ad8c78a8b18d0b4
-
SHA256
7673dc23941d0b9c8ef4a8c634620b98d4cfceae75a93af17c310bae4f407855
-
SHA512
f868738f0971b382cb8b69a17788aade92d7d35ec9ee306d3f41c1e3737e052ae9ab487499b79eabc397046bf3f3aafdc7feabbba9d390128ea33b0a0a27b3d4
-
SSDEEP
24576:inhP+vMRuU30+TNaM5golG/jYwndkxPdFiud9DsHvG:intcMRt0+5DedkxPdJdVs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2316 7847188494e7b747500620a1f65e9743.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 7847188494e7b747500620a1f65e9743.exe -
resource yara_rule behavioral2/memory/1332-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/2316-15-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x0009000000023217-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1332 7847188494e7b747500620a1f65e9743.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1332 7847188494e7b747500620a1f65e9743.exe 2316 7847188494e7b747500620a1f65e9743.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1332 wrote to memory of 2316 1332 7847188494e7b747500620a1f65e9743.exe 88 PID 1332 wrote to memory of 2316 1332 7847188494e7b747500620a1f65e9743.exe 88 PID 1332 wrote to memory of 2316 1332 7847188494e7b747500620a1f65e9743.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7847188494e7b747500620a1f65e9743.exe"C:\Users\Admin\AppData\Local\Temp\7847188494e7b747500620a1f65e9743.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\7847188494e7b747500620a1f65e9743.exeC:\Users\Admin\AppData\Local\Temp\7847188494e7b747500620a1f65e9743.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2316
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5e59c99d55c1628d00d35db1bd941c2f4
SHA11e933bfcac6efa72f2da9c82db16aa105b609920
SHA256b4085cbbdac9947ed31fdcc333a1555dcc94698c62ad0a48d883a8d4fb811cb5
SHA51252d6e5774d133a77aeb4dee18262ee1d3dddca6a0d7f392f2c3d39bdb2c0e4f62fb53a550f70c844892105353aa3ffe44af61a72945e08ffa917044c00e708c8