Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 08:52
Behavioral task
behavioral1
Sample
9b3ef43d18a8c0d2959c8ce723e3a263.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b3ef43d18a8c0d2959c8ce723e3a263.exe
Resource
win10v2004-20231215-en
General
-
Target
9b3ef43d18a8c0d2959c8ce723e3a263.exe
-
Size
2.5MB
-
MD5
9b3ef43d18a8c0d2959c8ce723e3a263
-
SHA1
950dc315adae5660ffe5a2a2b7e2e8f4cffa9d18
-
SHA256
94ffc3b6ce6fe7d046092cd35a9259d94874e8cbd74c5fef5109a2c8999cc4fb
-
SHA512
e988e1d2a19298a080162593c350aa27cbaef92e4d49a8b75ede1700d3b03438fa237759b67cabaf7160eed9d59fb0c8386a9619388cf3a741ecc32e709b66a2
-
SSDEEP
49152:kLmM/TWIB3OALfZnCNAtN74NH5HUyNRcUsCVOzet0:QpWIB3OAjZnCNU4HBUCczz9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2004 9b3ef43d18a8c0d2959c8ce723e3a263.exe -
Executes dropped EXE 1 IoCs
pid Process 2004 9b3ef43d18a8c0d2959c8ce723e3a263.exe -
resource yara_rule behavioral2/memory/1892-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00060000000231fa-11.dat upx behavioral2/memory/2004-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1892 9b3ef43d18a8c0d2959c8ce723e3a263.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1892 9b3ef43d18a8c0d2959c8ce723e3a263.exe 2004 9b3ef43d18a8c0d2959c8ce723e3a263.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2004 1892 9b3ef43d18a8c0d2959c8ce723e3a263.exe 84 PID 1892 wrote to memory of 2004 1892 9b3ef43d18a8c0d2959c8ce723e3a263.exe 84 PID 1892 wrote to memory of 2004 1892 9b3ef43d18a8c0d2959c8ce723e3a263.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b3ef43d18a8c0d2959c8ce723e3a263.exe"C:\Users\Admin\AppData\Local\Temp\9b3ef43d18a8c0d2959c8ce723e3a263.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\9b3ef43d18a8c0d2959c8ce723e3a263.exeC:\Users\Admin\AppData\Local\Temp\9b3ef43d18a8c0d2959c8ce723e3a263.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2004
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
640KB
MD5ca75f09efc7c42528fa8b7a00878f192
SHA1a8066c6576a103ded5589fa1d925988b16692543
SHA25618ca288c4a5fa568d25b6d52817e3f3a2d6f01c5964803ed5669753b3d039306
SHA512f8a5844ec42302191aeccc7b768963e3cff12c49bb39abbbcf1a49f296df1d21153033f280ceea7a48eaf1ace6f3ce163fcefda8390cc0b19110d281fa01507b