Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
8f37e0a58fcb46302e833bcb6f5c4492.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f37e0a58fcb46302e833bcb6f5c4492.exe
Resource
win10v2004-20231215-en
General
-
Target
8f37e0a58fcb46302e833bcb6f5c4492.exe
-
Size
82KB
-
MD5
8f37e0a58fcb46302e833bcb6f5c4492
-
SHA1
5d6919e63b228819c2fc90012cf54ed43d739f44
-
SHA256
a17268e8e3cd009aeb607066350d40c37ce63cbac4dab03b20d96cd0aea6199a
-
SHA512
60399ba7a08473217792a923fb97d417204fc1a57d3a99a4364aeb7f3940ed6c7e0c31af9516e399e7c3c1f1df083953ba7eb8da8d7f12cee9218d876d76be3a
-
SSDEEP
1536:3vXGdU6Wu2UEin1zfrchpqO2YXCE92IxuQ3+HN8En2NtuhaNi201O/Fz7VRHUwpC:+dU6+UEin1vchpL1XCE92i+u0eHVRhnC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1160 8f37e0a58fcb46302e833bcb6f5c4492.exe -
Executes dropped EXE 1 IoCs
pid Process 1160 8f37e0a58fcb46302e833bcb6f5c4492.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2204 8f37e0a58fcb46302e833bcb6f5c4492.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2204 8f37e0a58fcb46302e833bcb6f5c4492.exe 1160 8f37e0a58fcb46302e833bcb6f5c4492.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1160 2204 8f37e0a58fcb46302e833bcb6f5c4492.exe 85 PID 2204 wrote to memory of 1160 2204 8f37e0a58fcb46302e833bcb6f5c4492.exe 85 PID 2204 wrote to memory of 1160 2204 8f37e0a58fcb46302e833bcb6f5c4492.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f37e0a58fcb46302e833bcb6f5c4492.exe"C:\Users\Admin\AppData\Local\Temp\8f37e0a58fcb46302e833bcb6f5c4492.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\8f37e0a58fcb46302e833bcb6f5c4492.exeC:\Users\Admin\AppData\Local\Temp\8f37e0a58fcb46302e833bcb6f5c4492.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1160
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5eeaad3cb91490f05be5c624cc4b26309
SHA150f004074f9743efddafd0b318417f2363b5c8ad
SHA2569c54a93a63c90e002d3337f840042bda8bd2ae14722f9af7e4cdc3f5e70826e7
SHA5124d0544266108dea8948ef73f427bb34383f6656aeb190014e15f9fff15a101be82ff8deae7f30600969da2e0ddb724f6a7f2a6a179958501b290867b67c19b0b