Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 17:59
Behavioral task
behavioral1
Sample
b8055daa9320f93aa4705288829b589b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8055daa9320f93aa4705288829b589b.exe
Resource
win10v2004-20240226-en
General
-
Target
b8055daa9320f93aa4705288829b589b.exe
-
Size
2.7MB
-
MD5
b8055daa9320f93aa4705288829b589b
-
SHA1
d5ab80d776d2d110f7c987db098e43affdb2db5e
-
SHA256
4c823fee3ab1b6e643c6bc382b9e9bcf7b58ac9b296023e11c8e144b3f7ec183
-
SHA512
934701b1848b1243b91f7b585030c2705974ca68cc1716170e9de2543138c6a7fbb2db41cd7c5aea619c1e6eb59933923a4e98f44c6335b1f02be826dd2c6c81
-
SSDEEP
49152:EaS8HbCmNEtO1vAPo67WEvIN3ztG/H4/jnOYplIQLnBw:iaCmNQCeINhCgnO6V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4988 b8055daa9320f93aa4705288829b589b.exe -
Executes dropped EXE 1 IoCs
pid Process 4988 b8055daa9320f93aa4705288829b589b.exe -
resource yara_rule behavioral2/memory/3244-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000300000001e9a0-13.dat upx behavioral2/memory/4988-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3244 b8055daa9320f93aa4705288829b589b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3244 b8055daa9320f93aa4705288829b589b.exe 4988 b8055daa9320f93aa4705288829b589b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3244 wrote to memory of 4988 3244 b8055daa9320f93aa4705288829b589b.exe 88 PID 3244 wrote to memory of 4988 3244 b8055daa9320f93aa4705288829b589b.exe 88 PID 3244 wrote to memory of 4988 3244 b8055daa9320f93aa4705288829b589b.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8055daa9320f93aa4705288829b589b.exe"C:\Users\Admin\AppData\Local\Temp\b8055daa9320f93aa4705288829b589b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\b8055daa9320f93aa4705288829b589b.exeC:\Users\Admin\AppData\Local\Temp\b8055daa9320f93aa4705288829b589b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4988
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5cbb8eee96c8206d0a8b107788169354b
SHA1f2f94d35d2445e9e5d73deb13c5a9201b82eb17c
SHA256bc3d83016ea989ae763febabfa17dab3b889ebfcc43ebb791b3decf0850412ea
SHA512572cd67d92566e3ea46e75777185d0d27815130c12f1e37eb258b8c3fa5af1bf91ab11d1f2b00546b379dfddf52c05cf025b521fce98b38aed83dd7dbb66ffb2