Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 14:26
Behavioral task
behavioral1
Sample
cba51ad11fce7be8419d81dbd783bb38.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cba51ad11fce7be8419d81dbd783bb38.exe
Resource
win10v2004-20240226-en
General
-
Target
cba51ad11fce7be8419d81dbd783bb38.exe
-
Size
11.4MB
-
MD5
cba51ad11fce7be8419d81dbd783bb38
-
SHA1
dfc0ed60ff2638414a98102d21be2a281ae08d18
-
SHA256
3b4a149f093ca68928c8bf274de7d2c868002d31dc2b20a2007c13d805a27069
-
SHA512
b8bbcc0213951c874c50e93884f40fbb231c310227961980625498e216a7d2414498e11239b63691e82111b56e73d8bac9d1ac780680f5c0d7deab97d8e25767
-
SSDEEP
196608:TBTbd8auq1jI86FA7y2auq1jI86oDdr58rJjauq1jI86FA7y2auq1jI86B:hOlHSzlHmdyZlHSzlHB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1960 cba51ad11fce7be8419d81dbd783bb38.exe -
Executes dropped EXE 1 IoCs
pid Process 1960 cba51ad11fce7be8419d81dbd783bb38.exe -
resource yara_rule behavioral2/memory/4692-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000001e59e-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4692 cba51ad11fce7be8419d81dbd783bb38.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4692 cba51ad11fce7be8419d81dbd783bb38.exe 1960 cba51ad11fce7be8419d81dbd783bb38.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4692 wrote to memory of 1960 4692 cba51ad11fce7be8419d81dbd783bb38.exe 90 PID 4692 wrote to memory of 1960 4692 cba51ad11fce7be8419d81dbd783bb38.exe 90 PID 4692 wrote to memory of 1960 4692 cba51ad11fce7be8419d81dbd783bb38.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\cba51ad11fce7be8419d81dbd783bb38.exe"C:\Users\Admin\AppData\Local\Temp\cba51ad11fce7be8419d81dbd783bb38.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\cba51ad11fce7be8419d81dbd783bb38.exeC:\Users\Admin\AppData\Local\Temp\cba51ad11fce7be8419d81dbd783bb38.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1960
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.4MB
MD5e85f7147b608bde576759fe9c537a2f0
SHA1763d1debee6aa3cae6794b25bfae8496f21a6fb5
SHA256b4e2fed4d62bb64a1646959e55fbdc12d0e2a412541e308da9e6813c26871af8
SHA5127de1827f9640fa32019c7d85a15e399950b1da778f0ac9455e74804c4a725755954fe3d42f2f0b8eacac54f9f12b0cabc2e07d4bf2e6bef9740f9893a6fedfad