Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 07:50
Behavioral task
behavioral1
Sample
ab61877aeba85f2299873654cb2f3990.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab61877aeba85f2299873654cb2f3990.exe
Resource
win10v2004-20240226-en
General
-
Target
ab61877aeba85f2299873654cb2f3990.exe
-
Size
10.6MB
-
MD5
ab61877aeba85f2299873654cb2f3990
-
SHA1
1469d4e761e332c386d352743791dd938601fb40
-
SHA256
dedce699d9aa64f357ecaa5c59158a2cc8b957979d25b854deb7ecc280bfbcf7
-
SHA512
2e949c142b44c39b905452dc4245a5ff591c6e8704f7fb50d39258b79eae5e7637a8ef9f6f2aaaa6a27302ad7c18269fbd3a04c95d662184c03e605319a57f5f
-
SSDEEP
196608:j5k8LvJuXxZuxx+DAJuXxZpCGViBcKyLxJmJuXxZuxx+DAJuXxZo:jRbme6Am5hiBSmme6Am4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2236 ab61877aeba85f2299873654cb2f3990.exe -
Executes dropped EXE 1 IoCs
pid Process 2236 ab61877aeba85f2299873654cb2f3990.exe -
resource yara_rule behavioral2/memory/1540-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00080000000231fa-11.dat upx behavioral2/memory/2236-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1540 ab61877aeba85f2299873654cb2f3990.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1540 ab61877aeba85f2299873654cb2f3990.exe 2236 ab61877aeba85f2299873654cb2f3990.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2236 1540 ab61877aeba85f2299873654cb2f3990.exe 88 PID 1540 wrote to memory of 2236 1540 ab61877aeba85f2299873654cb2f3990.exe 88 PID 1540 wrote to memory of 2236 1540 ab61877aeba85f2299873654cb2f3990.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab61877aeba85f2299873654cb2f3990.exe"C:\Users\Admin\AppData\Local\Temp\ab61877aeba85f2299873654cb2f3990.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\ab61877aeba85f2299873654cb2f3990.exeC:\Users\Admin\AppData\Local\Temp\ab61877aeba85f2299873654cb2f3990.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2236
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.6MB
MD5e91d4930684b50eaccb4c3d613edd595
SHA179632d88532a1a794b5c284020341fde7d330579
SHA25666a84894524d56eca65aeb042046a5f32451c5aaf91ad2367eb31af221da7905
SHA512f344bc04781e1c3857470a5b9db08b6e066f86f0a947dd97f322e82122b4e71eacb6ace8dacce176da7094f5f6db17ef4b90312d1d14ee7b8cf85213106f6ce0