Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 12:11
Behavioral task
behavioral1
Sample
c5d7a1955f49e4308217ca2a9824d157.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c5d7a1955f49e4308217ca2a9824d157.exe
Resource
win10v2004-20240226-en
General
-
Target
c5d7a1955f49e4308217ca2a9824d157.exe
-
Size
1.3MB
-
MD5
c5d7a1955f49e4308217ca2a9824d157
-
SHA1
66190fb23fd916ce8e1f1fd796f50032f4fb22f7
-
SHA256
3438a27fca9fefb29272717d785a6f83590d1195c14f8005382160c31b25c1fa
-
SHA512
e1660c161ab8a0b74bced9e58afbe5c4e929d61f87fc5a2121d663cb2007ac45ad1b8b3bce85ab0136f05dad89137f59d855fdf61ea9bcc9395ea7568809fee7
-
SSDEEP
24576:GDtRxC8Gsgma3uPKz3fAC+XP4OAdl7ZfywQNvG:AR0jRmauwfR+/4OK1IwQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2124 c5d7a1955f49e4308217ca2a9824d157.exe -
Executes dropped EXE 1 IoCs
pid Process 2124 c5d7a1955f49e4308217ca2a9824d157.exe -
resource yara_rule behavioral2/memory/1300-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000400000001e980-13.dat upx behavioral2/memory/2124-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1300 c5d7a1955f49e4308217ca2a9824d157.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1300 c5d7a1955f49e4308217ca2a9824d157.exe 2124 c5d7a1955f49e4308217ca2a9824d157.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2124 1300 c5d7a1955f49e4308217ca2a9824d157.exe 89 PID 1300 wrote to memory of 2124 1300 c5d7a1955f49e4308217ca2a9824d157.exe 89 PID 1300 wrote to memory of 2124 1300 c5d7a1955f49e4308217ca2a9824d157.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5d7a1955f49e4308217ca2a9824d157.exe"C:\Users\Admin\AppData\Local\Temp\c5d7a1955f49e4308217ca2a9824d157.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\c5d7a1955f49e4308217ca2a9824d157.exeC:\Users\Admin\AppData\Local\Temp\c5d7a1955f49e4308217ca2a9824d157.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2124
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD58601dfbb8596b54fa1239a149fe17bbb
SHA1b40a4d3cb6f28fba2afb1c1e769afa4fa4cad827
SHA25680b476a2f37afce42b9f787590e07208e87c70d8486a6905b7e72eed33553235
SHA512cafbb9be06a0b0ae687ed39e7189c44b4da6ffb4a433cfcc187b0d6f54b8ca2876647e717d656c8c4ba6eca607109daac34d00f2e152a5c364032d6469503266