Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 14:12
Behavioral task
behavioral1
Sample
b7999c13a3a1ceb50c0b108d42599a7d.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b7999c13a3a1ceb50c0b108d42599a7d.exe
Resource
win10v2004-20240226-en
General
-
Target
b7999c13a3a1ceb50c0b108d42599a7d.exe
-
Size
2.4MB
-
MD5
b7999c13a3a1ceb50c0b108d42599a7d
-
SHA1
9b9e784b6cbd5419c1c5e7486849a3ee230ddfad
-
SHA256
eb0cdf466f279eedd1238ba55f1b6cd48cc9122edc6d41e2210660f70e1ac916
-
SHA512
6143ba69c734546bb57cdef81743df99ba7d8952240fe1a17b6ea15913c708fab2c1704bd05a31acb979a94267c182fefc2b5e9d081954cfef728f666aea3b94
-
SSDEEP
49152:Ahcq8smRChJyxw4oOp+sWVwEiR+P4M338dB2IBlGuuDVUsdxxjr:Vq8ghAZqNrgg3gnl/IVUs1jr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1228 b7999c13a3a1ceb50c0b108d42599a7d.exe -
Executes dropped EXE 1 IoCs
pid Process 1228 b7999c13a3a1ceb50c0b108d42599a7d.exe -
resource yara_rule behavioral2/memory/3280-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000900000001db0b-11.dat upx behavioral2/memory/1228-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3280 b7999c13a3a1ceb50c0b108d42599a7d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3280 b7999c13a3a1ceb50c0b108d42599a7d.exe 1228 b7999c13a3a1ceb50c0b108d42599a7d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3280 wrote to memory of 1228 3280 b7999c13a3a1ceb50c0b108d42599a7d.exe 86 PID 3280 wrote to memory of 1228 3280 b7999c13a3a1ceb50c0b108d42599a7d.exe 86 PID 3280 wrote to memory of 1228 3280 b7999c13a3a1ceb50c0b108d42599a7d.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7999c13a3a1ceb50c0b108d42599a7d.exe"C:\Users\Admin\AppData\Local\Temp\b7999c13a3a1ceb50c0b108d42599a7d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\b7999c13a3a1ceb50c0b108d42599a7d.exeC:\Users\Admin\AppData\Local\Temp\b7999c13a3a1ceb50c0b108d42599a7d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1228
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5a2b65518b8b15c30d1086816ec3e76f9
SHA1d4ad9400f6aa444cb3fb62ae54dde778bde81f4f
SHA25670b92aa0bba09ce8ba01e0b50e9d273719f86433c45d9727ae23930eb702d47f
SHA51276e54f1cc00e6e5a5068ef6071d34313cc36d942045c5fcfa884ff684a5104d742fe93c7f2da54281a4312455404b4e346e86c6b1573eba6f779f05a2e90cd08