Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
106s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 17:19
Static task
static1
Behavioral task
behavioral1
Sample
b93e5a2e8779157d93c4e483cf5f1e06.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b93e5a2e8779157d93c4e483cf5f1e06.exe
Resource
win10v2004-20231215-en
General
-
Target
b93e5a2e8779157d93c4e483cf5f1e06.exe
-
Size
1.6MB
-
MD5
b93e5a2e8779157d93c4e483cf5f1e06
-
SHA1
ad8fa9f7587d4eafc5cc716e773cb30551d133f3
-
SHA256
a391273e1302246196bce1ce205197a6d936493f31373083b9beacbf6a047cd2
-
SHA512
3c08e5b22259ccd85a5b74588f053ff44ae4b3e463162bf4d353aaeff6c4104e334137a2a9609ff9328c1cdd5bd95742e1d0a06f74e34a0fec6a3948243e68cf
-
SSDEEP
49152:kIyBGeeMY8bpzu43eNJHolNmJhOJuc226tMc:7yYjMFbpzre7D08c22O
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 752 b93e5a2e8779157d93c4e483cf5f1e06.exe -
Executes dropped EXE 1 IoCs
pid Process 752 b93e5a2e8779157d93c4e483cf5f1e06.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4536 b93e5a2e8779157d93c4e483cf5f1e06.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4536 b93e5a2e8779157d93c4e483cf5f1e06.exe 752 b93e5a2e8779157d93c4e483cf5f1e06.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4536 wrote to memory of 752 4536 b93e5a2e8779157d93c4e483cf5f1e06.exe 85 PID 4536 wrote to memory of 752 4536 b93e5a2e8779157d93c4e483cf5f1e06.exe 85 PID 4536 wrote to memory of 752 4536 b93e5a2e8779157d93c4e483cf5f1e06.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b93e5a2e8779157d93c4e483cf5f1e06.exe"C:\Users\Admin\AppData\Local\Temp\b93e5a2e8779157d93c4e483cf5f1e06.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\b93e5a2e8779157d93c4e483cf5f1e06.exeC:\Users\Admin\AppData\Local\Temp\b93e5a2e8779157d93c4e483cf5f1e06.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:752
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD58ee8abc2e64462a96b30e52b0bd90343
SHA13820ddbe9ea18e163bdc4f37f406e5f15c9da857
SHA256a2ff134b3f72f58686117621cafba4a297ce9fee0a2b64a5b9756b4a16430524
SHA512a38cb101bb4836e7863e0ea7a936643df0db73c830cc3175c25cb18c0e0e57f7031ea0aae05ad2324c27f31068f35e14431a03d60ec6d677663b1fd3a17271de