Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 14:45
Behavioral task
behavioral1
Sample
b8fcbe42650e928fa3646dde8ffa314d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8fcbe42650e928fa3646dde8ffa314d.exe
Resource
win10v2004-20240226-en
General
-
Target
b8fcbe42650e928fa3646dde8ffa314d.exe
-
Size
5.3MB
-
MD5
b8fcbe42650e928fa3646dde8ffa314d
-
SHA1
5859102b9d82dd3412ed239ab94f551bc6c551c3
-
SHA256
9f0ea704cd6563c4599c75f1174d334ac800b1e605f70532866dbeba8ac92e97
-
SHA512
f76ee03953331fd01ff6d9ba6ec1650342c114fc73200827bb29bbddbafe0eda5991fbe2e66fe156a6a2746596bc94fad6247a44e3c7e07ac860e321d6b13e54
-
SSDEEP
98304:g+tfeydBrc0KndE8+Xmj/os3MJoGeUiDtndE8+:g+tljrLKn68+kwsrG1iDtn68+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2332 b8fcbe42650e928fa3646dde8ffa314d.exe -
Executes dropped EXE 1 IoCs
pid Process 2332 b8fcbe42650e928fa3646dde8ffa314d.exe -
resource yara_rule behavioral2/memory/2980-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000400000001e980-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2980 b8fcbe42650e928fa3646dde8ffa314d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2980 b8fcbe42650e928fa3646dde8ffa314d.exe 2332 b8fcbe42650e928fa3646dde8ffa314d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2332 2980 b8fcbe42650e928fa3646dde8ffa314d.exe 88 PID 2980 wrote to memory of 2332 2980 b8fcbe42650e928fa3646dde8ffa314d.exe 88 PID 2980 wrote to memory of 2332 2980 b8fcbe42650e928fa3646dde8ffa314d.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8fcbe42650e928fa3646dde8ffa314d.exe"C:\Users\Admin\AppData\Local\Temp\b8fcbe42650e928fa3646dde8ffa314d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\b8fcbe42650e928fa3646dde8ffa314d.exeC:\Users\Admin\AppData\Local\Temp\b8fcbe42650e928fa3646dde8ffa314d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2332
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD5331e3614c852e55b6fe6b2f1a18d9772
SHA14293877b3bfc525fa330bbeba630e1b57d672c7d
SHA256733a2145d95909d98060e9589200f8946e805da36b236d9ce512d169c01a68b5
SHA512bb1f7c7a5bba7c0c4240df35684508bbcfe62d9a2a3123325c2bad77984561f034ad816e7a4bc08191e81687ad886999e9f8acfb1c51484aa8b388a47759f390