Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 18:03
Behavioral task
behavioral1
Sample
ac824d47a4d15778dd74790edb519291.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac824d47a4d15778dd74790edb519291.exe
Resource
win10v2004-20240226-en
General
-
Target
ac824d47a4d15778dd74790edb519291.exe
-
Size
1.3MB
-
MD5
ac824d47a4d15778dd74790edb519291
-
SHA1
a98d534d1b43b662fd2abda00c4e7583ffebb1df
-
SHA256
a8a17a5065108c7d04210fd5b6848983d38a4380e9a9da1216d5c53d2bff45fc
-
SHA512
37061d5e9a4c6e206c55fbac981cacde238e68249db56edc7d0378bb56f99a4b3c63ff7eab697ff5be6238b7a2f74156dc91fafb1e4de856317b311c583d48c7
-
SSDEEP
24576:TTTV6bRa7ACGDHpepiMLGN4o0nMyB/lTUEPIW2KujNFjRekvG:TTTwRq4WPuQMyBmaEKujXj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3288 ac824d47a4d15778dd74790edb519291.exe -
Executes dropped EXE 1 IoCs
pid Process 3288 ac824d47a4d15778dd74790edb519291.exe -
resource yara_rule behavioral2/memory/3868-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x00090000000224f7-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3868 ac824d47a4d15778dd74790edb519291.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3868 ac824d47a4d15778dd74790edb519291.exe 3288 ac824d47a4d15778dd74790edb519291.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3868 wrote to memory of 3288 3868 ac824d47a4d15778dd74790edb519291.exe 90 PID 3868 wrote to memory of 3288 3868 ac824d47a4d15778dd74790edb519291.exe 90 PID 3868 wrote to memory of 3288 3868 ac824d47a4d15778dd74790edb519291.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac824d47a4d15778dd74790edb519291.exe"C:\Users\Admin\AppData\Local\Temp\ac824d47a4d15778dd74790edb519291.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\ac824d47a4d15778dd74790edb519291.exeC:\Users\Admin\AppData\Local\Temp\ac824d47a4d15778dd74790edb519291.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3288
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b20fd187dd6f1e5f7ed2b1c9ad256d2d
SHA143ee56ffcfd5e6d64309925ab01ce9274abb294a
SHA2561afe74e45a37e380f6e0a707fa1eac91ef265157a3612e2f5ed8145c4ade7d1f
SHA5125b79bcd7a935946347ba0185a2d71417909828dc43f9d189281d4d994dfec494aa32f6072da7afae4d811055ac0ea0d6771fe63f3f4290d21a11b368e62d82b9