Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 12:08
Behavioral task
behavioral1
Sample
d3781a163d0410fef27b8f93d0424ed4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3781a163d0410fef27b8f93d0424ed4.exe
Resource
win10v2004-20240226-en
General
-
Target
d3781a163d0410fef27b8f93d0424ed4.exe
-
Size
1.5MB
-
MD5
d3781a163d0410fef27b8f93d0424ed4
-
SHA1
ae5be963ede3d8bbc088b1983866f05bde3583eb
-
SHA256
3533b975668ad6bc6d590325744d800bfdb72938262d01cd30642aedcbebbe4f
-
SHA512
382ee2f7f3cc152133d1df21c22b2720565bde19866ed6a82e1c9c9397b0b175810016af77adcc37137f57995b7b3db94e43d3624ecdb51c264d2e900d4513e6
-
SSDEEP
24576:EKpdaHwN+9pqm7s58FHB8J1fxLZEB5zgElvWZuN3Io/n5fQf8mybETW:9d9Mzqm7s5AOJZxW5zDsuNFn5vxET
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4892 d3781a163d0410fef27b8f93d0424ed4.exe -
Executes dropped EXE 1 IoCs
pid Process 4892 d3781a163d0410fef27b8f93d0424ed4.exe -
resource yara_rule behavioral2/memory/3356-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000400000001e980-10.dat upx behavioral2/memory/4892-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3356 d3781a163d0410fef27b8f93d0424ed4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3356 d3781a163d0410fef27b8f93d0424ed4.exe 4892 d3781a163d0410fef27b8f93d0424ed4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3356 wrote to memory of 4892 3356 d3781a163d0410fef27b8f93d0424ed4.exe 88 PID 3356 wrote to memory of 4892 3356 d3781a163d0410fef27b8f93d0424ed4.exe 88 PID 3356 wrote to memory of 4892 3356 d3781a163d0410fef27b8f93d0424ed4.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3781a163d0410fef27b8f93d0424ed4.exe"C:\Users\Admin\AppData\Local\Temp\d3781a163d0410fef27b8f93d0424ed4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\d3781a163d0410fef27b8f93d0424ed4.exeC:\Users\Admin\AppData\Local\Temp\d3781a163d0410fef27b8f93d0424ed4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4892
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5cdd0ee9e52a8b219d794935b2b324265
SHA1bb667ad88e0bd6358a150ed30b7931dae01d4bfd
SHA256c8ce51bd91016e1191cc29b1ec2e174e83a4feda6c52e367e947217f6a1de92c
SHA51249154f0ca2318b92418c8943e1bdfc8dd27d7c32fec930bc4eddaa81663ec39505e84de084ce3ebf466bd0f11697add9f21fbf24a8e4b18d3de7bdb286f0f19d