Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 19:45
Behavioral task
behavioral1
Sample
a06df8dfe494b9522f7ff162cfc92d05.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a06df8dfe494b9522f7ff162cfc92d05.exe
Resource
win10v2004-20240221-en
General
-
Target
a06df8dfe494b9522f7ff162cfc92d05.exe
-
Size
10.2MB
-
MD5
a06df8dfe494b9522f7ff162cfc92d05
-
SHA1
bd49bf85567c25c3ed0928a38dbcccc33eaff32f
-
SHA256
cdc91b1ffffa9480fdd1649f9f46111379cc49de40c475badbf6961d762f8fbc
-
SHA512
045fa8f9ae962e07291f54887986cc2425eeccea0a0158b2b17e4254dadbe2985c5266787639d57d817daa87b06acbb33fbf7441d5cc8ef118020e6d61def3f6
-
SSDEEP
98304:QG/JZeGtKd3j9nicJGxAoYM1XC63cY+jEwbeKzCPfB2jx3j9nicJGxAoYM1XC63:ZB5tKx5iKzH+aY+Kwjt5iKzH+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2296 a06df8dfe494b9522f7ff162cfc92d05.exe -
Executes dropped EXE 1 IoCs
pid Process 2296 a06df8dfe494b9522f7ff162cfc92d05.exe -
resource yara_rule behavioral2/memory/1532-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral2/files/0x00080000000231ff-12.dat upx behavioral2/memory/2296-14-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1532 a06df8dfe494b9522f7ff162cfc92d05.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1532 a06df8dfe494b9522f7ff162cfc92d05.exe 2296 a06df8dfe494b9522f7ff162cfc92d05.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2296 1532 a06df8dfe494b9522f7ff162cfc92d05.exe 86 PID 1532 wrote to memory of 2296 1532 a06df8dfe494b9522f7ff162cfc92d05.exe 86 PID 1532 wrote to memory of 2296 1532 a06df8dfe494b9522f7ff162cfc92d05.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a06df8dfe494b9522f7ff162cfc92d05.exe"C:\Users\Admin\AppData\Local\Temp\a06df8dfe494b9522f7ff162cfc92d05.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\a06df8dfe494b9522f7ff162cfc92d05.exeC:\Users\Admin\AppData\Local\Temp\a06df8dfe494b9522f7ff162cfc92d05.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2296
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.2MB
MD50fa7427bbee87380f32d8cc1325df33e
SHA1a3350b9c93829b9def457d2981243a86a87f3f28
SHA256970228421c326514d1f7f4f28f6ca7cd24958d3f6a41dd15d4b164988eef3332
SHA512c2c10feaf3482f3f07dbc23878fae3ad8f3e43aa5d9cec5041fecabad65ec89fdafbaca5cff7828a0be3089702685c3a17b65b24ffaea2c0821a1d07953e24f0