Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    168s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2024, 21:13

General

  • Target

    b9accc6f47c9af2b02b2d0e2baf27887.exe

  • Size

    165KB

  • MD5

    b9accc6f47c9af2b02b2d0e2baf27887

  • SHA1

    641f1f2b08dc2ccb18e9c1fd327ebe9d73a06de1

  • SHA256

    83a23e150f81237005b762cd1af1b3ae408f7042ea58166c5bcf4811d47e7be7

  • SHA512

    9636a98c2a516882f589066d2ab85ad9ae8d730c0bcd7671bb9e1d0dce40846866d648aa7837603fc13bbea1e4ae7ef125ebe27ac85bcde9dcd63f018b7c8d19

  • SSDEEP

    3072:fScOoXlUPJuPLIxkoSna0RNbANvQwEy91/V+tXnAaPdMgLvSZzYzUf9N:qu1URu0ernauNbo1eAaPdMBzZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9accc6f47c9af2b02b2d0e2baf27887.exe
    "C:\Users\Admin\AppData\Local\Temp\b9accc6f47c9af2b02b2d0e2baf27887.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:336
    • C:\Users\Admin\AppData\Local\Temp\b9accc6f47c9af2b02b2d0e2baf27887.exe
      C:\Users\Admin\AppData\Local\Temp\b9accc6f47c9af2b02b2d0e2baf27887.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1960
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1032 --field-trial-handle=3016,i,1323102786462900035,7687994236215859601,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2976

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\b9accc6f47c9af2b02b2d0e2baf27887.exe

      Filesize

      165KB

      MD5

      caee3557ece31dac1e8425c6b9404d2a

      SHA1

      d57d0526eb28533e37c0cf03317780db6b67167c

      SHA256

      b2429049a95eb8d8ac6141129d2c7d9f0041a0b6a80ec6fd58b49d5ded23cbb4

      SHA512

      775653e504b7bc1b7f19ed692d460a81333ddd61ddee473b21fe8eac8675cf56c81a524a557ad0599cdb98470c9eb01474ee01e42e05ac0efc6548e1da52d6a5

    • memory/336-0-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/336-1-0x00000000001C0000-0x00000000001EF000-memory.dmp

      Filesize

      188KB

    • memory/336-2-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/336-11-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1960-14-0x00000000001D0000-0x00000000001FF000-memory.dmp

      Filesize

      188KB

    • memory/1960-13-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1960-20-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1960-21-0x00000000014F0000-0x000000000150B000-memory.dmp

      Filesize

      108KB