Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
b58a1bd01a526dde43ec25f5e8576f5b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b58a1bd01a526dde43ec25f5e8576f5b.exe
Resource
win10v2004-20240226-en
General
-
Target
b58a1bd01a526dde43ec25f5e8576f5b.exe
-
Size
82KB
-
MD5
b58a1bd01a526dde43ec25f5e8576f5b
-
SHA1
0861353559a627df20fc8d74db2c7318c0346aef
-
SHA256
e63feaba4f7b086666bc1a975640afcfdc827875951483a9ae8216afb20c8f73
-
SHA512
b7207845e2b1c230c8023eab2ba7eaef622e055a9e140aeca5a97bb039df79d11d2773156f3d6e78963e4ef1b7713195f6a29637971f1dd82947bd6bb4684a80
-
SSDEEP
1536:j7uuinqAhJrmrG8ZIe8dm6Psx2WjvEtRp/CqeVHr7fGUcz+iB:j7uuRA2rbQnPsQZtRVUffGUc9B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1308 b58a1bd01a526dde43ec25f5e8576f5b.exe -
Executes dropped EXE 1 IoCs
pid Process 1308 b58a1bd01a526dde43ec25f5e8576f5b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 624 b58a1bd01a526dde43ec25f5e8576f5b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 624 b58a1bd01a526dde43ec25f5e8576f5b.exe 1308 b58a1bd01a526dde43ec25f5e8576f5b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 624 wrote to memory of 1308 624 b58a1bd01a526dde43ec25f5e8576f5b.exe 90 PID 624 wrote to memory of 1308 624 b58a1bd01a526dde43ec25f5e8576f5b.exe 90 PID 624 wrote to memory of 1308 624 b58a1bd01a526dde43ec25f5e8576f5b.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b58a1bd01a526dde43ec25f5e8576f5b.exe"C:\Users\Admin\AppData\Local\Temp\b58a1bd01a526dde43ec25f5e8576f5b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\b58a1bd01a526dde43ec25f5e8576f5b.exeC:\Users\Admin\AppData\Local\Temp\b58a1bd01a526dde43ec25f5e8576f5b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1308
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5c0366c5697a3282b9b2d00888d0ce7ee
SHA186467c2810ae73ca02b6b4b3b6ca46693436b4ec
SHA25643ca6982cfa503144c82d61c00659b20354b79b1b260c91c0ea8b5f53b154d27
SHA512b6d35d6617fdd187dd802a77e07feac05696755fd99b945ab5d1713e1e297dcb0a7724168b3b9281f3fbfb59b6ce5d9c17b3144dbfc3e1a76ea20c73b44ee052