Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
99580b3301bdb169cf89486107fbb019.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
99580b3301bdb169cf89486107fbb019.exe
Resource
win10v2004-20231215-en
General
-
Target
99580b3301bdb169cf89486107fbb019.exe
-
Size
82KB
-
MD5
99580b3301bdb169cf89486107fbb019
-
SHA1
59605f4d31331e78585294fdfec22a8435d86423
-
SHA256
12a2e7e4cadf81cc5dc13d045adb6de06d08e8b4b4adb5cd68b1368be92f0c4e
-
SHA512
21d12be39aa66314584c77b7eff91fd258f4f842d1f5b182c361270a61ce598d9e1d6b501b3becf41a9eb2c3b8722fe13dba7db5f98a06d0979a3a035455bac7
-
SSDEEP
1536:IPcFDdvTUPigetmBUS9ifRoL9lsWaXP8rqrefLeIBFA3VGKGVR:gyTUPFnxI0gP82eaIBFA3eR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3004 99580b3301bdb169cf89486107fbb019.exe -
Executes dropped EXE 1 IoCs
pid Process 3004 99580b3301bdb169cf89486107fbb019.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1844 99580b3301bdb169cf89486107fbb019.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1844 99580b3301bdb169cf89486107fbb019.exe 3004 99580b3301bdb169cf89486107fbb019.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1844 wrote to memory of 3004 1844 99580b3301bdb169cf89486107fbb019.exe 85 PID 1844 wrote to memory of 3004 1844 99580b3301bdb169cf89486107fbb019.exe 85 PID 1844 wrote to memory of 3004 1844 99580b3301bdb169cf89486107fbb019.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\99580b3301bdb169cf89486107fbb019.exe"C:\Users\Admin\AppData\Local\Temp\99580b3301bdb169cf89486107fbb019.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\99580b3301bdb169cf89486107fbb019.exeC:\Users\Admin\AppData\Local\Temp\99580b3301bdb169cf89486107fbb019.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3004
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD522ee6d782efe6a7f345278ddd0da3ce4
SHA1b1cb5cb550495f5893be28f58396e4277c05ebc3
SHA2567a736f23af1a4c3daee6534ff9b17c3e77010e94246f64eabee38929cf5e2d10
SHA5123b5ef9c15b81aeec62f141fe9b664ed5e8024ea443ea3b0bb35d689de467fbcf1716b6412dacc121891b414bee206d8a9feaa1cc81aa85e96efb7c494e0c3cda