Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 16:17
Behavioral task
behavioral1
Sample
bbb35740aa745a1bf1d7f7e4b2564070.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bbb35740aa745a1bf1d7f7e4b2564070.exe
Resource
win10v2004-20240226-en
General
-
Target
bbb35740aa745a1bf1d7f7e4b2564070.exe
-
Size
1.3MB
-
MD5
bbb35740aa745a1bf1d7f7e4b2564070
-
SHA1
e2d402953ff50952f85e37713f07cafe7e71ba03
-
SHA256
6cc3a22fc78149237dc821aec6fb2643d4b7822fea284c54c29f13bb7ebfa71e
-
SHA512
ef2e971e2be5db8e54856c8d30df2cec426a7e2b337c92d9aaa23cd8c460e17d0b66dab0c26b9dd5e796f8a6d068085467c21aa0894496840a42395c567d7da6
-
SSDEEP
24576:+wQxEL1EJ0WuSWvQ/wc9kF8tSgsLkmaGJ0gNAlfTGtdbL4z0U9/9Us:SxEwaU9FSHZzAf66R9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1364 bbb35740aa745a1bf1d7f7e4b2564070.exe -
Executes dropped EXE 1 IoCs
pid Process 1364 bbb35740aa745a1bf1d7f7e4b2564070.exe -
resource yara_rule behavioral2/memory/2528-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000300000001e9a0-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2528 bbb35740aa745a1bf1d7f7e4b2564070.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2528 bbb35740aa745a1bf1d7f7e4b2564070.exe 1364 bbb35740aa745a1bf1d7f7e4b2564070.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1364 2528 bbb35740aa745a1bf1d7f7e4b2564070.exe 89 PID 2528 wrote to memory of 1364 2528 bbb35740aa745a1bf1d7f7e4b2564070.exe 89 PID 2528 wrote to memory of 1364 2528 bbb35740aa745a1bf1d7f7e4b2564070.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbb35740aa745a1bf1d7f7e4b2564070.exe"C:\Users\Admin\AppData\Local\Temp\bbb35740aa745a1bf1d7f7e4b2564070.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\bbb35740aa745a1bf1d7f7e4b2564070.exeC:\Users\Admin\AppData\Local\Temp\bbb35740aa745a1bf1d7f7e4b2564070.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1364
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5315adbd9ef36a0a64fd2dbe92985502a
SHA1d0de5a8016f82b9dd87c61ee0646f20b307daf40
SHA2568112a1d2985ee8cabaaceacf2cffa4fe9a144380d8254b1aec7015c041502402
SHA51289d4d8fabffdc52effad0b6f06e39932478177454a4eb35377ab7b89e5c63c9282e75be5ef38314654cfe9075ed77080a1f63bf3a8eccfd351ba488ce41ed359