Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 12:31
Behavioral task
behavioral1
Sample
bb4401b5e30127c3de4b4056e832eb35.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb4401b5e30127c3de4b4056e832eb35.exe
Resource
win10v2004-20240226-en
General
-
Target
bb4401b5e30127c3de4b4056e832eb35.exe
-
Size
2.9MB
-
MD5
bb4401b5e30127c3de4b4056e832eb35
-
SHA1
cf5df2f49c3b2a9c7c286835831833987c1ed2e7
-
SHA256
1c3878005f3b5d8f3f22b53c3b4cc22b854336115a415521a5897ff3dbd677c6
-
SHA512
e1c962c989082be5179c080f964c1fa65483083665974ac4a7155624f74afaa4dea7cb35d98dd2d5b07dfe1de2f14a0b6ae9e5a147611827923b9f28207414d3
-
SSDEEP
49152:Tj6kFcSyqifuo0n6WlEyrU278P4P4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:TOdtLf/0lUA8P4gg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5072 bb4401b5e30127c3de4b4056e832eb35.exe -
Executes dropped EXE 1 IoCs
pid Process 5072 bb4401b5e30127c3de4b4056e832eb35.exe -
resource yara_rule behavioral2/memory/1452-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000f00000002324d-11.dat upx behavioral2/memory/5072-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1452 bb4401b5e30127c3de4b4056e832eb35.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1452 bb4401b5e30127c3de4b4056e832eb35.exe 5072 bb4401b5e30127c3de4b4056e832eb35.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1452 wrote to memory of 5072 1452 bb4401b5e30127c3de4b4056e832eb35.exe 96 PID 1452 wrote to memory of 5072 1452 bb4401b5e30127c3de4b4056e832eb35.exe 96 PID 1452 wrote to memory of 5072 1452 bb4401b5e30127c3de4b4056e832eb35.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb4401b5e30127c3de4b4056e832eb35.exe"C:\Users\Admin\AppData\Local\Temp\bb4401b5e30127c3de4b4056e832eb35.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\bb4401b5e30127c3de4b4056e832eb35.exeC:\Users\Admin\AppData\Local\Temp\bb4401b5e30127c3de4b4056e832eb35.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4072 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:4836
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5b5be2d2f97b8570b579822bccfff605f
SHA1af1476e01eff41df0f9d103e2f46870f8550d4f6
SHA25695db67431ff51f73fd0d32d148d5f1dfd520916b5f1a8fa9c829d323178c20bf
SHA512295797eb8c2cf4142bc2ddc0d9daa0284fe4c2f26c9e98fcc0e721fa43fd675ae66b45730aa20eaf97f401ee8416793a7704613a15184e716848b781ff89a5ac