Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
acd830a00b916ce8065dc2e8ea156305.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
acd830a00b916ce8065dc2e8ea156305.exe
Resource
win10v2004-20240226-en
General
-
Target
acd830a00b916ce8065dc2e8ea156305.exe
-
Size
1.6MB
-
MD5
acd830a00b916ce8065dc2e8ea156305
-
SHA1
b338ad85eb1082d1ec437ce8d9547b66460764bf
-
SHA256
cb70843f3cef671831a7588cbfd6a2d010a7a0f9fec59d904b1af4256d2ffdeb
-
SHA512
4ae13077f1c6f1eca70d8390bb515d5555eb947f4a5710d33f01a0a4018706c204527a34255d8a4f436c2a4cfb7fdddbf01ae8c4b4092cb669ed2c6750df7519
-
SSDEEP
24576:l/XtKK2QyttKwOdx+VtaVgGFd+9iGY1t2UWtaHw71+QIb8Vu8vMY0gYGoYYVMbQ:lMKrcozAnapFd+92tbJQ7PSv26tMc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3376 acd830a00b916ce8065dc2e8ea156305.exe -
Executes dropped EXE 1 IoCs
pid Process 3376 acd830a00b916ce8065dc2e8ea156305.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1392 acd830a00b916ce8065dc2e8ea156305.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1392 acd830a00b916ce8065dc2e8ea156305.exe 3376 acd830a00b916ce8065dc2e8ea156305.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1392 wrote to memory of 3376 1392 acd830a00b916ce8065dc2e8ea156305.exe 87 PID 1392 wrote to memory of 3376 1392 acd830a00b916ce8065dc2e8ea156305.exe 87 PID 1392 wrote to memory of 3376 1392 acd830a00b916ce8065dc2e8ea156305.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\acd830a00b916ce8065dc2e8ea156305.exe"C:\Users\Admin\AppData\Local\Temp\acd830a00b916ce8065dc2e8ea156305.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\acd830a00b916ce8065dc2e8ea156305.exeC:\Users\Admin\AppData\Local\Temp\acd830a00b916ce8065dc2e8ea156305.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3376
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD52f75a0e9f57633a9812049719910b82c
SHA176c7bbb66b8da31ff15dbc963099c1ee1718aac9
SHA256daaf23631e447fd6068e3ea37df571dcaaede30e45b511f4de250dc9c0af49e9
SHA512f3900501fdd8068646efcbfc7ffa3604318dfe2d75f09319e2ee365ee5f4742c5d3e6188d7c7b44ea08dedbc049f66e192edd885905a46b3f29d713ddd69a635