Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 05:05
Behavioral task
behavioral1
Sample
ba9622617bc650222be6581d020c673d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba9622617bc650222be6581d020c673d.exe
Resource
win10v2004-20240226-en
General
-
Target
ba9622617bc650222be6581d020c673d.exe
-
Size
1.5MB
-
MD5
ba9622617bc650222be6581d020c673d
-
SHA1
ae835a37731bd716ca18a918c66a417b5c211fbc
-
SHA256
5b6af1cb6f3f633151d17872f24bf55888899f53ff99f26fd2759dcfcdf1ec1d
-
SHA512
f5e39b758aa0dccb92c7c41a352c4a7199dad20b05a1f73f3576aeb0ec58de5243078f1d835851ee62100b05e67747e3a7774adfb28c75926eddace3e15e5a81
-
SSDEEP
24576:354BRJFy+FKfir3TczkpITe2Jr6A7qklkBS5DgkgMtQiclX3JX9ppj7c26nW:J4bj9rjGd6AekeB7kgMtelHJNj7A
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 812 ba9622617bc650222be6581d020c673d.exe -
Executes dropped EXE 1 IoCs
pid Process 812 ba9622617bc650222be6581d020c673d.exe -
resource yara_rule behavioral2/memory/2560-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000300000001e9a0-11.dat upx behavioral2/memory/812-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2560 ba9622617bc650222be6581d020c673d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2560 ba9622617bc650222be6581d020c673d.exe 812 ba9622617bc650222be6581d020c673d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2560 wrote to memory of 812 2560 ba9622617bc650222be6581d020c673d.exe 89 PID 2560 wrote to memory of 812 2560 ba9622617bc650222be6581d020c673d.exe 89 PID 2560 wrote to memory of 812 2560 ba9622617bc650222be6581d020c673d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba9622617bc650222be6581d020c673d.exe"C:\Users\Admin\AppData\Local\Temp\ba9622617bc650222be6581d020c673d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\ba9622617bc650222be6581d020c673d.exeC:\Users\Admin\AppData\Local\Temp\ba9622617bc650222be6581d020c673d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:812
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5b5bd49503f7f72c3cf31697e2f662f63
SHA16618f2c3acc504ed014e1cde1666bf5f1002ac82
SHA256e97e7a155236e16ed49a4eb1c22200b2bf071e0b753822e814e9492adad2dd44
SHA512e1cd7b79917f3e1f5f99324c0df5f5e17f7495b5f52d727aafb014f8a5969deae9a2a44282c88d36e38b802bf81a9e37d00149edbf83a856e9de2121b46c6d0f