Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
afa2f55e149097f9b250142bbfd94d9d56d10649c96adb079fdb0dfdac7c6660.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
afa2f55e149097f9b250142bbfd94d9d56d10649c96adb079fdb0dfdac7c6660.exe
Resource
win10v2004-20231215-en
General
-
Target
afa2f55e149097f9b250142bbfd94d9d56d10649c96adb079fdb0dfdac7c6660.exe
-
Size
1.7MB
-
MD5
5214e287e7509bb4940901996b496d4d
-
SHA1
a3fe343817dc817c091fb2b30b36600abfb062df
-
SHA256
afa2f55e149097f9b250142bbfd94d9d56d10649c96adb079fdb0dfdac7c6660
-
SHA512
c29a538c58407e46d79df33d05014ea2156cf40dec11122569d9135adfe15f6b1a038bac4dc88a3ac8b2f2aae3cb72e22cf10cdacbe621dc8d3d60d57ef18797
-
SSDEEP
24576:QLBCNLuUJ8CMxio71kiSyvrZzUeQmu1+sbkGsN9zZ4uQMWsUbMjCfxXmikVgiK:Q94Lu1C6ryhwrFQmuXuFdHWjIjCgzVz
Malware Config
Signatures
-
Detects executables manipulated with Fody 1 IoCs
resource yara_rule behavioral2/memory/4448-1-0x00000000009C0000-0x0000000000B7A000-memory.dmp INDICATOR_EXE_Packed_Fody -
Detects executables packed with Agile.NET / CliSecure 34 IoCs
resource yara_rule behavioral2/memory/4448-6-0x0000000005910000-0x0000000005AE8000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/files/0x000600000002322c-12.dat INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-15-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-18-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-16-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-20-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-22-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-24-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-26-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-30-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-28-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-32-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-34-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-36-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-38-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-42-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-46-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-50-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-54-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-56-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-52-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-58-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-60-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-64-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-62-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-66-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-48-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-68-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-72-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-74-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-76-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-70-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-44-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet behavioral2/memory/4448-40-0x0000000005910000-0x0000000005AE3000-memory.dmp INDICATOR_EXE_Packed_AgileDotNet -
Loads dropped DLL 1 IoCs
pid Process 4448 afa2f55e149097f9b250142bbfd94d9d56d10649c96adb079fdb0dfdac7c6660.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4448 afa2f55e149097f9b250142bbfd94d9d56d10649c96adb079fdb0dfdac7c6660.exe 4448 afa2f55e149097f9b250142bbfd94d9d56d10649c96adb079fdb0dfdac7c6660.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD525b27819524e3aca751315f9e708c346
SHA1aa1c867adf9afe1a2f7fdc2319b425e4ff36cea5
SHA2561bd4428d1d257ebb0fc0d496fc454d9ade851ac448b416184d864d7fc27c9148
SHA512ca55955328b8a57ef8ac1c0a128d25151e1498a442bb0a0bbed68eb7026c2720f45b605d1a938e4c5a4781d336d912d1fb29f8d7b7ae829787c32dc6999db962