Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 18:47
Behavioral task
behavioral1
Sample
8fe290e18503dcdb7ebaedbae92075d3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8fe290e18503dcdb7ebaedbae92075d3.exe
Resource
win10v2004-20231215-en
General
-
Target
8fe290e18503dcdb7ebaedbae92075d3.exe
-
Size
2.9MB
-
MD5
8fe290e18503dcdb7ebaedbae92075d3
-
SHA1
7f2bba20aa5f6d3f3efed13069a91060853a20b9
-
SHA256
2f68f263708fd010f33ae5f2cf04569b652ee8f9c94e580a3e96aef094e37e99
-
SHA512
48f65935888c2583d27e0d4882addbbad8fe697c7be45891414c3b5d34b5ec12224e2c5403d8661b9cf0c4cf3682417c8c3e83159cadc62c8aff47315c477873
-
SSDEEP
49152:ZHNfs64iON9qdF0e0mXeYN74NH5HUyNRcUsCVOzetdZJ:ZHN062N9qImXeY4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3384 8fe290e18503dcdb7ebaedbae92075d3.exe -
Executes dropped EXE 1 IoCs
pid Process 3384 8fe290e18503dcdb7ebaedbae92075d3.exe -
resource yara_rule behavioral2/memory/5044-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/3384-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000c000000023157-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5044 8fe290e18503dcdb7ebaedbae92075d3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5044 8fe290e18503dcdb7ebaedbae92075d3.exe 3384 8fe290e18503dcdb7ebaedbae92075d3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5044 wrote to memory of 3384 5044 8fe290e18503dcdb7ebaedbae92075d3.exe 85 PID 5044 wrote to memory of 3384 5044 8fe290e18503dcdb7ebaedbae92075d3.exe 85 PID 5044 wrote to memory of 3384 5044 8fe290e18503dcdb7ebaedbae92075d3.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fe290e18503dcdb7ebaedbae92075d3.exe"C:\Users\Admin\AppData\Local\Temp\8fe290e18503dcdb7ebaedbae92075d3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\8fe290e18503dcdb7ebaedbae92075d3.exeC:\Users\Admin\AppData\Local\Temp\8fe290e18503dcdb7ebaedbae92075d3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3384
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
330KB
MD5d3c35bfcf011e8b8df8785a5c9c7736f
SHA103517e11e12f3d67481277a3f27acb1bba800d33
SHA256c1bef9a2ce2ec1931f88f797d84eac41fd0d7502ae7908f373a788b2815d1d03
SHA512e1f433fb1eea051c3118910e8b92c2b41f337e93fe8449cf56160077f54898cb027b779db595e9c4c6c636f429af4ac393c27de60aa13cabaa700e8848e91454