Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    106s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2024, 17:19

General

  • Target

    b93e5a2e8779157d93c4e483cf5f1e06.exe

  • Size

    1.6MB

  • MD5

    b93e5a2e8779157d93c4e483cf5f1e06

  • SHA1

    ad8fa9f7587d4eafc5cc716e773cb30551d133f3

  • SHA256

    a391273e1302246196bce1ce205197a6d936493f31373083b9beacbf6a047cd2

  • SHA512

    3c08e5b22259ccd85a5b74588f053ff44ae4b3e463162bf4d353aaeff6c4104e334137a2a9609ff9328c1cdd5bd95742e1d0a06f74e34a0fec6a3948243e68cf

  • SSDEEP

    49152:kIyBGeeMY8bpzu43eNJHolNmJhOJuc226tMc:7yYjMFbpzre7D08c22O

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b93e5a2e8779157d93c4e483cf5f1e06.exe
    "C:\Users\Admin\AppData\Local\Temp\b93e5a2e8779157d93c4e483cf5f1e06.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Users\Admin\AppData\Local\Temp\b93e5a2e8779157d93c4e483cf5f1e06.exe
      C:\Users\Admin\AppData\Local\Temp\b93e5a2e8779157d93c4e483cf5f1e06.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\b93e5a2e8779157d93c4e483cf5f1e06.exe

    Filesize

    1.6MB

    MD5

    8ee8abc2e64462a96b30e52b0bd90343

    SHA1

    3820ddbe9ea18e163bdc4f37f406e5f15c9da857

    SHA256

    a2ff134b3f72f58686117621cafba4a297ce9fee0a2b64a5b9756b4a16430524

    SHA512

    a38cb101bb4836e7863e0ea7a936643df0db73c830cc3175c25cb18c0e0e57f7031ea0aae05ad2324c27f31068f35e14431a03d60ec6d677663b1fd3a17271de

  • memory/752-13-0x0000000000400000-0x0000000000877000-memory.dmp

    Filesize

    4.5MB

  • memory/752-15-0x0000000001C80000-0x00000000020F7000-memory.dmp

    Filesize

    4.5MB

  • memory/752-14-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/752-20-0x0000000000400000-0x0000000000640000-memory.dmp

    Filesize

    2.2MB

  • memory/752-21-0x00000000058E0000-0x0000000005B2D000-memory.dmp

    Filesize

    2.3MB

  • memory/4536-0-0x0000000000400000-0x0000000000877000-memory.dmp

    Filesize

    4.5MB

  • memory/4536-1-0x0000000001CB0000-0x0000000002127000-memory.dmp

    Filesize

    4.5MB

  • memory/4536-2-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/4536-11-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB