Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 07:15
Behavioral task
behavioral1
Sample
adfdba51de0fc3818e573713538a1cdc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
adfdba51de0fc3818e573713538a1cdc.exe
Resource
win10v2004-20240226-en
General
-
Target
adfdba51de0fc3818e573713538a1cdc.exe
-
Size
2.7MB
-
MD5
adfdba51de0fc3818e573713538a1cdc
-
SHA1
a58eff882ff7078dde38743e73fae99aa24eb01a
-
SHA256
f766da895695a554d99745d7f55e37d3eb427bffbbcb4f6d37ca0306cc197844
-
SHA512
342fe8c11e562ad0237c3dec5b057bf83c340e3a963378fd649f30c83f776ad9771814d5a6f1f5ff441f9f308962e256b0cc638421b3fe904931f9983c478c6c
-
SSDEEP
49152:85Lji1oickcGvPVTTWMW6HgHA7IxPn6R9fHn5kgQBHaFIQGyeUaLw0yYLKvR9j:85LjGot6BTyKMJQHfnCQ7Gy70z+vHj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2656 adfdba51de0fc3818e573713538a1cdc.exe -
Executes dropped EXE 1 IoCs
pid Process 2656 adfdba51de0fc3818e573713538a1cdc.exe -
resource yara_rule behavioral2/memory/1572-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000900000002324b-11.dat upx behavioral2/memory/2656-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1572 adfdba51de0fc3818e573713538a1cdc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1572 adfdba51de0fc3818e573713538a1cdc.exe 2656 adfdba51de0fc3818e573713538a1cdc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1572 wrote to memory of 2656 1572 adfdba51de0fc3818e573713538a1cdc.exe 96 PID 1572 wrote to memory of 2656 1572 adfdba51de0fc3818e573713538a1cdc.exe 96 PID 1572 wrote to memory of 2656 1572 adfdba51de0fc3818e573713538a1cdc.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\adfdba51de0fc3818e573713538a1cdc.exe"C:\Users\Admin\AppData\Local\Temp\adfdba51de0fc3818e573713538a1cdc.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\adfdba51de0fc3818e573713538a1cdc.exeC:\Users\Admin\AppData\Local\Temp\adfdba51de0fc3818e573713538a1cdc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3180 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:4280
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
617KB
MD555d760b78479de5de55d84721fa86ad7
SHA198cf6ed192d5a28d85fdb0ccab3692b282547e20
SHA25628dcf1d9c1292b7152d4e566f2cfe50ccb842f155ab81760d078063260271c22
SHA5123246b9e08add3d7f5914a45cabe3589405e468fc82e6b0f4edc322643c4a9dc78546fa9356319b70ea1bc135e3dea6cfeb85231bfdccf96304a712367b42b288