Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 12:29
Behavioral task
behavioral1
Sample
bb434573cd75c5375c6efa6739393543.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb434573cd75c5375c6efa6739393543.exe
Resource
win10v2004-20240226-en
General
-
Target
bb434573cd75c5375c6efa6739393543.exe
-
Size
2.7MB
-
MD5
bb434573cd75c5375c6efa6739393543
-
SHA1
f5a89ea11c21da81c5068d6af13f1c17655cd4fe
-
SHA256
eefc53d13f077f9b18c67821839189ab5b5f0670ee9f8265558e42532d1c7f0f
-
SHA512
aea0dabeacaf4d1fe5b78c502494513653c5aff0b512b7ed4f36710dc07417754395717ad93786a7f8e38d0d17d7e4b10ff40fe1a0332bfad590525aabfdb4e1
-
SSDEEP
49152:DYqq5kgEr52s4Fm/kZecauvTJ6VYehsip6mOh2XdiMibA/eipq/9BA4ukf:DYk7l2s4Fm/ktd58sipz/vx69i4ukf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4584 bb434573cd75c5375c6efa6739393543.exe -
Executes dropped EXE 1 IoCs
pid Process 4584 bb434573cd75c5375c6efa6739393543.exe -
resource yara_rule behavioral2/memory/2260-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000e000000023157-12.dat upx behavioral2/memory/4584-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2260 bb434573cd75c5375c6efa6739393543.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2260 bb434573cd75c5375c6efa6739393543.exe 4584 bb434573cd75c5375c6efa6739393543.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2260 wrote to memory of 4584 2260 bb434573cd75c5375c6efa6739393543.exe 96 PID 2260 wrote to memory of 4584 2260 bb434573cd75c5375c6efa6739393543.exe 96 PID 2260 wrote to memory of 4584 2260 bb434573cd75c5375c6efa6739393543.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb434573cd75c5375c6efa6739393543.exe"C:\Users\Admin\AppData\Local\Temp\bb434573cd75c5375c6efa6739393543.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\bb434573cd75c5375c6efa6739393543.exeC:\Users\Admin\AppData\Local\Temp\bb434573cd75c5375c6efa6739393543.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3908 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:81⤵PID:2428
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD569a456555f9818fababbc10f6cbcb6e4
SHA13fa4c803a4bcd68f3e7696a97b5b001db8294e82
SHA2565897a606536275a459a330fc5ea1c3d355424e0eeea5c9e6392358471f02a5d8
SHA512e88864a5b157a735b4d78163e7d3fc34f53980aff66703191873c9c22156b7807bfb669f579422456c3ac747f85096e647622469dfecb5bfbed9fbd50b7d6561