Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 19:10
Behavioral task
behavioral1
Sample
cc3319af3aa41f65f096144ddc637d3b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc3319af3aa41f65f096144ddc637d3b.exe
Resource
win10v2004-20240226-en
General
-
Target
cc3319af3aa41f65f096144ddc637d3b.exe
-
Size
2.9MB
-
MD5
cc3319af3aa41f65f096144ddc637d3b
-
SHA1
7f3342d175a47bc0b8396eb9aec0be416ca967b2
-
SHA256
d376f3aec9b58a3c60233ea0d11f0fa1c2a69c7ae8ad035b18d9313c2771044c
-
SHA512
7df658a1434e8159af643547526910e741b7d7a2d68423d8f8133798215fd934bc6a3e75fbbc4450a231af8e72bf3118bb872c02917cbbe8e68c2ab1ec9054a2
-
SSDEEP
49152:Iw7xM9pM/UBMaBjndAPGITVCDfP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:vsM/UFlni6Dfgg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2564 cc3319af3aa41f65f096144ddc637d3b.exe -
Executes dropped EXE 1 IoCs
pid Process 2564 cc3319af3aa41f65f096144ddc637d3b.exe -
resource yara_rule behavioral2/memory/4364-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0008000000022886-11.dat upx behavioral2/memory/2564-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4364 cc3319af3aa41f65f096144ddc637d3b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4364 cc3319af3aa41f65f096144ddc637d3b.exe 2564 cc3319af3aa41f65f096144ddc637d3b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4364 wrote to memory of 2564 4364 cc3319af3aa41f65f096144ddc637d3b.exe 88 PID 4364 wrote to memory of 2564 4364 cc3319af3aa41f65f096144ddc637d3b.exe 88 PID 4364 wrote to memory of 2564 4364 cc3319af3aa41f65f096144ddc637d3b.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc3319af3aa41f65f096144ddc637d3b.exe"C:\Users\Admin\AppData\Local\Temp\cc3319af3aa41f65f096144ddc637d3b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\cc3319af3aa41f65f096144ddc637d3b.exeC:\Users\Admin\AppData\Local\Temp\cc3319af3aa41f65f096144ddc637d3b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2564
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5bd2c4d465dea1e3c4bfc58dde08f6952
SHA1945b0aebbb55cb0e7e82062a0ea3126a687774a3
SHA256cbdbab1618d898962cae46412f2dbbf60bf4ce63aa8e020445821e2783855878
SHA512aa513685a45c365faddbf9d35dc0282ea119845f79e3c2b4695babaf363e4bc5ced1cb4432391e0c0eb69be1dc20f9dbff96b81ec40230dd27f16b54747b036d