Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 14:35
Behavioral task
behavioral1
Sample
8c93bc78e063cf801c46d533f3a6bb22.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8c93bc78e063cf801c46d533f3a6bb22.exe
Resource
win10v2004-20231215-en
General
-
Target
8c93bc78e063cf801c46d533f3a6bb22.exe
-
Size
5.8MB
-
MD5
8c93bc78e063cf801c46d533f3a6bb22
-
SHA1
a3c73cb29ddf3f0402cec7e726e43a49a02eea48
-
SHA256
13161689117efe2d0b9cf670eda148e17f9f3b4c612094f6c7da52c8d551b316
-
SHA512
27a01fd7e421d7d22506a162206174797eb44ee347037e60dac0a6bcaa45c9af443cab160a8b6d1db0b263813e66618068d30558beae732a77cd574b1de4831b
-
SSDEEP
98304:QlRJRAVMKJygg3gnl/IVUs1jePshe1r7baWgZBjw+gg3gnl/IVUs1jePs:QlRr1uWgl/iBiPYetu3Vgl/iBiP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4868 8c93bc78e063cf801c46d533f3a6bb22.exe -
Executes dropped EXE 1 IoCs
pid Process 4868 8c93bc78e063cf801c46d533f3a6bb22.exe -
resource yara_rule behavioral2/memory/3628-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023201-11.dat upx behavioral2/memory/4868-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3628 8c93bc78e063cf801c46d533f3a6bb22.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3628 8c93bc78e063cf801c46d533f3a6bb22.exe 4868 8c93bc78e063cf801c46d533f3a6bb22.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3628 wrote to memory of 4868 3628 8c93bc78e063cf801c46d533f3a6bb22.exe 21 PID 3628 wrote to memory of 4868 3628 8c93bc78e063cf801c46d533f3a6bb22.exe 21 PID 3628 wrote to memory of 4868 3628 8c93bc78e063cf801c46d533f3a6bb22.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c93bc78e063cf801c46d533f3a6bb22.exe"C:\Users\Admin\AppData\Local\Temp\8c93bc78e063cf801c46d533f3a6bb22.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\8c93bc78e063cf801c46d533f3a6bb22.exeC:\Users\Admin\AppData\Local\Temp\8c93bc78e063cf801c46d533f3a6bb22.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4868
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5d78ec5b6f1bedee25488eea4431633d1
SHA14cb844f9e9feedc13dc43679681c00b1ed1161a8
SHA256fa124efe43d6dfeb22430d683253207396e0cfbb1f113fb15e499af5ecee89e1
SHA512a94d233cdc03325b2d6badded049d37a07b3cf6da031838354a92bbebe664b600f3f7e89ec0afe767a18fe9e1a58157be069cf42b20beef1c8fcc04c28d2e1eb