Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
9bf06e5ebc4fe5ae649112cdf3c692b6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9bf06e5ebc4fe5ae649112cdf3c692b6.exe
Resource
win10v2004-20231222-en
General
-
Target
9bf06e5ebc4fe5ae649112cdf3c692b6.exe
-
Size
165KB
-
MD5
9bf06e5ebc4fe5ae649112cdf3c692b6
-
SHA1
f5a4295b66de6039d617e3af77c998640afbac3f
-
SHA256
5df44dc999a9dd9ab659bf138454ef031194c920ab8b31288de1cdada63bab9e
-
SHA512
6069fd6b4a55f2100b7437da3254b4b3213fba451cef8a5a8516223c2b852e5a2f094cba40a82653c25124e2a3efe2d84ccd6111c4c112006111814928923cf8
-
SSDEEP
3072:upteG7x/lJ3QbK7z3SW857W8P8tfhHDn+lRJSI5l9Mg/RuZrsnagYnTdEV:up91/lJgbfn7WwE5HDneTSI5la+9sny
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1020 9bf06e5ebc4fe5ae649112cdf3c692b6.exe -
Executes dropped EXE 1 IoCs
pid Process 1020 9bf06e5ebc4fe5ae649112cdf3c692b6.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4328 9bf06e5ebc4fe5ae649112cdf3c692b6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4328 9bf06e5ebc4fe5ae649112cdf3c692b6.exe 1020 9bf06e5ebc4fe5ae649112cdf3c692b6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4328 wrote to memory of 1020 4328 9bf06e5ebc4fe5ae649112cdf3c692b6.exe 85 PID 4328 wrote to memory of 1020 4328 9bf06e5ebc4fe5ae649112cdf3c692b6.exe 85 PID 4328 wrote to memory of 1020 4328 9bf06e5ebc4fe5ae649112cdf3c692b6.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bf06e5ebc4fe5ae649112cdf3c692b6.exe"C:\Users\Admin\AppData\Local\Temp\9bf06e5ebc4fe5ae649112cdf3c692b6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\9bf06e5ebc4fe5ae649112cdf3c692b6.exeC:\Users\Admin\AppData\Local\Temp\9bf06e5ebc4fe5ae649112cdf3c692b6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD5b313134f1a2b8a78323c1a95ecf20a18
SHA16a561280fd76e380f0b725064556f5ffeef051c3
SHA2560de13a9de486c8c8d0da25bbbc1760e01b32f193758f67e5db0f3c14aacac690
SHA5120fc41f8c3fdef25fd93f050641b4f385a785389d25ff41e87b8c74802aa659a7be2d21fb22f477408b4dbd7d3f38a0dc555b46cdb583e2d63288f891b768c881