Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 07:55
Static task
static1
Behavioral task
behavioral1
Sample
c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe
Resource
win10v2004-20240226-en
General
-
Target
c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe
-
Size
81KB
-
MD5
c55dac1c9fa463b5ab3a4a3f7baa8f6d
-
SHA1
8b1218f872cc9cc77350365cb2589732c33612df
-
SHA256
391e3824f5d43089e499b7bdf5f4e8de3ea8dc35809055a7fa948e7d0c2dcc8d
-
SHA512
d8661221416d2706b786b1054ae1935a6058534b191040f7cd79b004b3b1a0a33928d7bcd0e3176df8547e9d50ef77af9b71e65d60ce89042aa6e91e33523989
-
SSDEEP
1536:ZkJ6fELmRsNPK8mRxPMpym1oWC9Z3nm0yjNwaWQEtWeHUi4Kjw73:ZkAbRsNjIcy6oWIhsIQEsg3je
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4028 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe -
Executes dropped EXE 1 IoCs
pid Process 4028 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1524 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1524 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe 4028 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1524 wrote to memory of 4028 1524 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe 91 PID 1524 wrote to memory of 4028 1524 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe 91 PID 1524 wrote to memory of 4028 1524 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe"C:\Users\Admin\AppData\Local\Temp\c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\c55dac1c9fa463b5ab3a4a3f7baa8f6d.exeC:\Users\Admin\AppData\Local\Temp\c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4028
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD596edaf7924ee99c49d4bdb585cd4bef4
SHA191bfd72de1b2b7df62e0d05541359d067a86fc82
SHA256a7b8ab683f7b3452d648b18477300634e454c8c8e6113e51cb3726c75672c02c
SHA512b45a253a4ba56b895a922a1dedec675b69b0c79baff830efc121d41d447f895ab97297ddea4a23419300b8471f36a4ee70519554e6e0217cc689dad5d502f06b