Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 03:26
Behavioral task
behavioral1
Sample
886e88306e43da70c4b6e9f10afe08e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
886e88306e43da70c4b6e9f10afe08e4.exe
Resource
win10v2004-20231222-en
General
-
Target
886e88306e43da70c4b6e9f10afe08e4.exe
-
Size
2.9MB
-
MD5
886e88306e43da70c4b6e9f10afe08e4
-
SHA1
14301afadd4a4dabd77f0500cd809349c6877f10
-
SHA256
2c4b9b8ce38571a0fc56a8787bcaf27c1bda386d0194a03179a75b05c540884b
-
SHA512
62394d86aa937181050102e89724ecd3b6b1c5c70c19f1d96c5e27548341fb0a38ae437a97d72f15a8670d5b0833acf9e5fbafb3925884ed7c05dcb17198b868
-
SSDEEP
49152:f/gv/fEJdT0R0h7qN2vsWrK7aNrP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:f/iMf5qNLWrDgg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2240 886e88306e43da70c4b6e9f10afe08e4.exe -
Executes dropped EXE 1 IoCs
pid Process 2240 886e88306e43da70c4b6e9f10afe08e4.exe -
resource yara_rule behavioral2/memory/4308-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00080000000231f0-11.dat upx behavioral2/memory/2240-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4308 886e88306e43da70c4b6e9f10afe08e4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4308 886e88306e43da70c4b6e9f10afe08e4.exe 2240 886e88306e43da70c4b6e9f10afe08e4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4308 wrote to memory of 2240 4308 886e88306e43da70c4b6e9f10afe08e4.exe 86 PID 4308 wrote to memory of 2240 4308 886e88306e43da70c4b6e9f10afe08e4.exe 86 PID 4308 wrote to memory of 2240 4308 886e88306e43da70c4b6e9f10afe08e4.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\886e88306e43da70c4b6e9f10afe08e4.exe"C:\Users\Admin\AppData\Local\Temp\886e88306e43da70c4b6e9f10afe08e4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\886e88306e43da70c4b6e9f10afe08e4.exeC:\Users\Admin\AppData\Local\Temp\886e88306e43da70c4b6e9f10afe08e4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2240
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD5ce6bb3436700c35abac99280f55893e6
SHA1842508a02ae617bc553fdcfaebafc49010cd4f43
SHA256508f36a53edc5dbf261b1bf8e9bb7d43089a35ef3954a262b7f9f9a28ba0431b
SHA512714677ebf63249e423906972fe8030bbe05ecef15ffe3a9714ddc673093328fa3873422833b75315d5e7371509b4bd331f35302c8f4c4274c98d901b5e8e236e