Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 22:39
Behavioral task
behavioral1
Sample
b9d75ea5b105f973b10c0a6028051b3f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9d75ea5b105f973b10c0a6028051b3f.exe
Resource
win10v2004-20240226-en
General
-
Target
b9d75ea5b105f973b10c0a6028051b3f.exe
-
Size
1.3MB
-
MD5
b9d75ea5b105f973b10c0a6028051b3f
-
SHA1
3ad94bc39c9827f6ae7135b2fe0e6d10c626f1ad
-
SHA256
5157c7773443db0cd93493f560ceef42e3d69f7cc973cfbc485da59470027d37
-
SHA512
29d5a1aa0194dd5bb2bd342cc438f7a33a8cfbf2cab04105d63cebfcc34d7d94b7219ab082f1b9c7bb5b4d94eec81cda9d5db541383dbdcb05e8e60ea4dd15ec
-
SSDEEP
24576:0JS9nPlw/C0mXQ8g5Z7cEsik7sSavB+GhYymvpZq/56EiZXxolD2DQRvG:YSR6/C0oLgvgk1omYZpZ86xqlD2U
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1492 b9d75ea5b105f973b10c0a6028051b3f.exe -
Executes dropped EXE 1 IoCs
pid Process 1492 b9d75ea5b105f973b10c0a6028051b3f.exe -
resource yara_rule behavioral2/memory/4024-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/1492-15-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x0002000000022ea1-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4024 b9d75ea5b105f973b10c0a6028051b3f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4024 b9d75ea5b105f973b10c0a6028051b3f.exe 1492 b9d75ea5b105f973b10c0a6028051b3f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4024 wrote to memory of 1492 4024 b9d75ea5b105f973b10c0a6028051b3f.exe 96 PID 4024 wrote to memory of 1492 4024 b9d75ea5b105f973b10c0a6028051b3f.exe 96 PID 4024 wrote to memory of 1492 4024 b9d75ea5b105f973b10c0a6028051b3f.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9d75ea5b105f973b10c0a6028051b3f.exe"C:\Users\Admin\AppData\Local\Temp\b9d75ea5b105f973b10c0a6028051b3f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\b9d75ea5b105f973b10c0a6028051b3f.exeC:\Users\Admin\AppData\Local\Temp\b9d75ea5b105f973b10c0a6028051b3f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1420 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:1300
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53d52b45383655bd3c6f35185fc97a65d
SHA1ee68eb2372f009cdce36e43a84174bfe2eb7686d
SHA256d0930d53b9631b241d702369d17173d787b6cc15264674e76358b9eeb63558e3
SHA5127d110ec07a3ab972a05353d47ae37506a7443618e13b979531cc1a12e8e615be5489aeada88990d56281b6d18125535ecdc04110e8d781932586f8cadf485317