Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 19:15
Behavioral task
behavioral1
Sample
87ae664470a2e862df8928a5ac5828e2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
87ae664470a2e862df8928a5ac5828e2.exe
Resource
win10v2004-20231215-en
General
-
Target
87ae664470a2e862df8928a5ac5828e2.exe
-
Size
1.3MB
-
MD5
87ae664470a2e862df8928a5ac5828e2
-
SHA1
6f083709e6c539994b3f0ecd6edf3884dfe1ea2b
-
SHA256
857ad9847402ad4557577e697dacaeb72d4edaf3037bf2ab1a411b32ca510a5e
-
SHA512
7abb1cd2755b3cde2fb5ed0b368b7e709f9fe1a1865820beb4f41776a08b77bb7cf7a246c0c8eaa9e830ce6ca1e835598f4be7e26e3879a59389e8dc53d41caa
-
SSDEEP
24576:Agzho7sFmKQBjxWBCf+HbSH8ND8btbIC76fvU9/9Us:/Vo7sFJSjIBCf0btNAbtUAScR9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4584 87ae664470a2e862df8928a5ac5828e2.exe -
Executes dropped EXE 1 IoCs
pid Process 4584 87ae664470a2e862df8928a5ac5828e2.exe -
resource yara_rule behavioral2/memory/560-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x00070000000231f8-11.dat upx behavioral2/memory/4584-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 560 87ae664470a2e862df8928a5ac5828e2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 560 87ae664470a2e862df8928a5ac5828e2.exe 4584 87ae664470a2e862df8928a5ac5828e2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 560 wrote to memory of 4584 560 87ae664470a2e862df8928a5ac5828e2.exe 84 PID 560 wrote to memory of 4584 560 87ae664470a2e862df8928a5ac5828e2.exe 84 PID 560 wrote to memory of 4584 560 87ae664470a2e862df8928a5ac5828e2.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\87ae664470a2e862df8928a5ac5828e2.exe"C:\Users\Admin\AppData\Local\Temp\87ae664470a2e862df8928a5ac5828e2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\87ae664470a2e862df8928a5ac5828e2.exeC:\Users\Admin\AppData\Local\Temp\87ae664470a2e862df8928a5ac5828e2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4584
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD51e594c9789cdac637d9137291a8ba348
SHA1a7702bc289abfc4d7b08d5957fc6e269aa6924f8
SHA2565f187189bf11b6d45702cf0a6364876b881936c31596d48aafcc63f5d92d3b7c
SHA512ac008bb718a05877e11d3cc36145450a9ddaccf3a1abe0181572865a510411f41050073f72330f5876ac8eb75302fe5f81edd1120413c1b2e47ea08453ffa051