Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 07:42
Behavioral task
behavioral1
Sample
8652759023180a6f20839095a26167ea.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8652759023180a6f20839095a26167ea.exe
Resource
win10v2004-20231222-en
General
-
Target
8652759023180a6f20839095a26167ea.exe
-
Size
11.7MB
-
MD5
8652759023180a6f20839095a26167ea
-
SHA1
6d960e37b8243aec4156086e60d9bef1f9b0e228
-
SHA256
c92187cd56818a8ab5b796fe4243925fc31d2a8b00504f1d345c4a99e38d8aa3
-
SHA512
277dd31d3df8b8a7866de1083e1f779451c4e32aa9ea73b21dec85813917fe6471fdf2dc06f3eaac902ed576ebf87369d2cfe207a4a77ed0057e8c5afb127566
-
SSDEEP
196608:Ph21yDacWCCCvI35NyWWC09rspaDGWCCCvI35NyWWC:01mfsCC5NyWqr5qsCC5NyW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4580 8652759023180a6f20839095a26167ea.exe -
Executes dropped EXE 1 IoCs
pid Process 4580 8652759023180a6f20839095a26167ea.exe -
resource yara_rule behavioral2/memory/1156-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00080000000231cc-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1156 8652759023180a6f20839095a26167ea.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1156 8652759023180a6f20839095a26167ea.exe 4580 8652759023180a6f20839095a26167ea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1156 wrote to memory of 4580 1156 8652759023180a6f20839095a26167ea.exe 89 PID 1156 wrote to memory of 4580 1156 8652759023180a6f20839095a26167ea.exe 89 PID 1156 wrote to memory of 4580 1156 8652759023180a6f20839095a26167ea.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8652759023180a6f20839095a26167ea.exe"C:\Users\Admin\AppData\Local\Temp\8652759023180a6f20839095a26167ea.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\8652759023180a6f20839095a26167ea.exeC:\Users\Admin\AppData\Local\Temp\8652759023180a6f20839095a26167ea.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4580
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
582KB
MD5356b3107441a1c5209c1e8639bf40443
SHA16979360554f237737e9ee144452644105b2670f9
SHA256141c5cc22c2b92019fa73e3b040f771b2ec5772ab913ed3d320841c20cb682b7
SHA5122a713c9711fb9ab6741abaa3865539e28d43aa79c537ff09fbf170297e998df4356ba43e60854f2c19728f33a77b8a5479b3f296e47f073296e07e410f6315e0