Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 08:56
Static task
static1
Behavioral task
behavioral1
Sample
96c494ce1773b242d7810477e5ca0847.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
96c494ce1773b242d7810477e5ca0847.exe
Resource
win10v2004-20231215-en
General
-
Target
96c494ce1773b242d7810477e5ca0847.exe
-
Size
82KB
-
MD5
96c494ce1773b242d7810477e5ca0847
-
SHA1
0230cec714674081084a1f7d83039fd3c85ab0c3
-
SHA256
92fb9724f0ef177668b4e5a4fc241b07770aecaefcab15798a5efdf0aa528267
-
SHA512
c33554fa9be8c6d9df3516a36e288df26f757cddaea6a793542442f974745f0ca961db60c4027e42e18d54c17774c2798ababade3e93e38343da0fb8ebf9beb7
-
SSDEEP
1536:jYXntOU3UrSHGgFY8RkSWkkkkJRDL9h5m1bNl+GJ7IKmY9Xte6cfO9CtJDnOhnbc:jYXntO5rN8RkSWkkkkJRDZh8NAoIKv9y
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3576 96c494ce1773b242d7810477e5ca0847.exe -
Executes dropped EXE 1 IoCs
pid Process 3576 96c494ce1773b242d7810477e5ca0847.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5004 96c494ce1773b242d7810477e5ca0847.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5004 96c494ce1773b242d7810477e5ca0847.exe 3576 96c494ce1773b242d7810477e5ca0847.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5004 wrote to memory of 3576 5004 96c494ce1773b242d7810477e5ca0847.exe 84 PID 5004 wrote to memory of 3576 5004 96c494ce1773b242d7810477e5ca0847.exe 84 PID 5004 wrote to memory of 3576 5004 96c494ce1773b242d7810477e5ca0847.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\96c494ce1773b242d7810477e5ca0847.exe"C:\Users\Admin\AppData\Local\Temp\96c494ce1773b242d7810477e5ca0847.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\96c494ce1773b242d7810477e5ca0847.exeC:\Users\Admin\AppData\Local\Temp\96c494ce1773b242d7810477e5ca0847.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3576
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5e344e116132e4334c3a7de558c3966ae
SHA11e89eeed99df78c05880fd10e2eaa95468a2381f
SHA2562de84039e4e5887e78523799167c85f6f1212135c68cd479f97727bcc10c0fa2
SHA51217d8e3babc43b9bf5e45fba0bbfa4d575e5b120bd7a0c66039983597998a7585cf0b74d058cbb0533effd66eaf4fbd5664982ec925934039f4eb91bc46e9cf10