Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
b9accc6f47c9af2b02b2d0e2baf27887.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b9accc6f47c9af2b02b2d0e2baf27887.exe
Resource
win10v2004-20240226-en
General
-
Target
b9accc6f47c9af2b02b2d0e2baf27887.exe
-
Size
165KB
-
MD5
b9accc6f47c9af2b02b2d0e2baf27887
-
SHA1
641f1f2b08dc2ccb18e9c1fd327ebe9d73a06de1
-
SHA256
83a23e150f81237005b762cd1af1b3ae408f7042ea58166c5bcf4811d47e7be7
-
SHA512
9636a98c2a516882f589066d2ab85ad9ae8d730c0bcd7671bb9e1d0dce40846866d648aa7837603fc13bbea1e4ae7ef125ebe27ac85bcde9dcd63f018b7c8d19
-
SSDEEP
3072:fScOoXlUPJuPLIxkoSna0RNbANvQwEy91/V+tXnAaPdMgLvSZzYzUf9N:qu1URu0ernauNbo1eAaPdMBzZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1960 b9accc6f47c9af2b02b2d0e2baf27887.exe -
Executes dropped EXE 1 IoCs
pid Process 1960 b9accc6f47c9af2b02b2d0e2baf27887.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 336 b9accc6f47c9af2b02b2d0e2baf27887.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 336 b9accc6f47c9af2b02b2d0e2baf27887.exe 1960 b9accc6f47c9af2b02b2d0e2baf27887.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 336 wrote to memory of 1960 336 b9accc6f47c9af2b02b2d0e2baf27887.exe 99 PID 336 wrote to memory of 1960 336 b9accc6f47c9af2b02b2d0e2baf27887.exe 99 PID 336 wrote to memory of 1960 336 b9accc6f47c9af2b02b2d0e2baf27887.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9accc6f47c9af2b02b2d0e2baf27887.exe"C:\Users\Admin\AppData\Local\Temp\b9accc6f47c9af2b02b2d0e2baf27887.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\b9accc6f47c9af2b02b2d0e2baf27887.exeC:\Users\Admin\AppData\Local\Temp\b9accc6f47c9af2b02b2d0e2baf27887.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1032 --field-trial-handle=3016,i,1323102786462900035,7687994236215859601,262144 --variations-seed-version /prefetch:81⤵PID:2976
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD5caee3557ece31dac1e8425c6b9404d2a
SHA1d57d0526eb28533e37c0cf03317780db6b67167c
SHA256b2429049a95eb8d8ac6141129d2c7d9f0041a0b6a80ec6fd58b49d5ded23cbb4
SHA512775653e504b7bc1b7f19ed692d460a81333ddd61ddee473b21fe8eac8675cf56c81a524a557ad0599cdb98470c9eb01474ee01e42e05ac0efc6548e1da52d6a5