Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
87b5cf9853b48d405292facce3fc4da0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
87b5cf9853b48d405292facce3fc4da0.exe
Resource
win10v2004-20231215-en
General
-
Target
87b5cf9853b48d405292facce3fc4da0.exe
-
Size
3.3MB
-
MD5
87b5cf9853b48d405292facce3fc4da0
-
SHA1
c2050be78d739553546f69cb8ede3dfda8e4ee62
-
SHA256
af4d0c5deb05760986ebd84be39a457dd9166e358f8155f1c4a0f61cdc9c4fde
-
SHA512
d6f536ab2e06a32c13487c5b51ab0ca836891db4b3fd1653824fc789a2f9784af001378acbf99ca711bcba70bc56f0480dfbe33b1ad524dd90baef38e9ab5981
-
SSDEEP
49152:3cZWSDE/paoEemmUITHfgFPqmm326tM20X6AEbapgeikEafWRRL6SGk+426tMc:3clE4oxmmU+4dq/32k+6Ajme4afWRf2O
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4416 87b5cf9853b48d405292facce3fc4da0.exe -
Executes dropped EXE 1 IoCs
pid Process 4416 87b5cf9853b48d405292facce3fc4da0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4464 87b5cf9853b48d405292facce3fc4da0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4464 87b5cf9853b48d405292facce3fc4da0.exe 4416 87b5cf9853b48d405292facce3fc4da0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4464 wrote to memory of 4416 4464 87b5cf9853b48d405292facce3fc4da0.exe 84 PID 4464 wrote to memory of 4416 4464 87b5cf9853b48d405292facce3fc4da0.exe 84 PID 4464 wrote to memory of 4416 4464 87b5cf9853b48d405292facce3fc4da0.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\87b5cf9853b48d405292facce3fc4da0.exe"C:\Users\Admin\AppData\Local\Temp\87b5cf9853b48d405292facce3fc4da0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\87b5cf9853b48d405292facce3fc4da0.exeC:\Users\Admin\AppData\Local\Temp\87b5cf9853b48d405292facce3fc4da0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4416
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5c6cdf72f1fe01e2b7e3c640518230b49
SHA1039ed445873a87f4585d6e786e273b06962c9cd4
SHA25624cd95e036ee6f04343ff2cf94b554fd6b6ce232bd15a307662fa45481c3537f
SHA512c25786d7359972e7f051a97aa3f8cbee047682042c3919caf916f7bae3d3d58f92e96e7df39d54db066742452c82adc3007526ac7136f30dd2af7a8dfff335e4