Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 14:22
Behavioral task
behavioral1
Sample
c6193d5611523a786a867070315db79d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6193d5611523a786a867070315db79d.exe
Resource
win10v2004-20240226-en
General
-
Target
c6193d5611523a786a867070315db79d.exe
-
Size
11.7MB
-
MD5
c6193d5611523a786a867070315db79d
-
SHA1
2d29ccf91441286e2ab89d58beeb5c5f69bf9455
-
SHA256
d1c91f347ea28557fa52652206d9ffbe55a1da28e0fc4f62ec230d0d410fd533
-
SHA512
4f80f3f09cf787954e9c71c3006674b0b447042fa293a10ad59d8b8e46eaff7d4f9a56383b23221dfd957c406d0978a236223c30066a0901d37882aabcf4cfa9
-
SSDEEP
196608:dkjjgl/iBiPvwsYWDPgl/iBiPVDAWkgl/iBiPvwsYWDPgl/iBiP:dkjj2imwsYWDP2i4k2imwsYWDP2i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 848 c6193d5611523a786a867070315db79d.exe -
Executes dropped EXE 1 IoCs
pid Process 848 c6193d5611523a786a867070315db79d.exe -
resource yara_rule behavioral2/memory/512-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000002321d-11.dat upx behavioral2/memory/848-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 512 c6193d5611523a786a867070315db79d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 512 c6193d5611523a786a867070315db79d.exe 848 c6193d5611523a786a867070315db79d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 512 wrote to memory of 848 512 c6193d5611523a786a867070315db79d.exe 89 PID 512 wrote to memory of 848 512 c6193d5611523a786a867070315db79d.exe 89 PID 512 wrote to memory of 848 512 c6193d5611523a786a867070315db79d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6193d5611523a786a867070315db79d.exe"C:\Users\Admin\AppData\Local\Temp\c6193d5611523a786a867070315db79d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\c6193d5611523a786a867070315db79d.exeC:\Users\Admin\AppData\Local\Temp\c6193d5611523a786a867070315db79d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:848
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD5c8e79b79cd86810660db60880cce2285
SHA1308a6e59728a5d91c37500dad009ac7721091d1c
SHA256dcb3feab374d5e4fb8471327b1b517e8bca92fe3650142bf9760b6637e7386d3
SHA512da2dbdc35c78eac2f388fc1acad36aadac50dc5e061be4541411beba151690789b1eb41434091b18158c5f8bc9a913a9f3b6c5cfa9806b4d2020afc48d57886a