Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
d3d10b59be88134d921e7c98b5dfb4ae.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3d10b59be88134d921e7c98b5dfb4ae.exe
Resource
win10v2004-20240226-en
General
-
Target
d3d10b59be88134d921e7c98b5dfb4ae.exe
-
Size
82KB
-
MD5
d3d10b59be88134d921e7c98b5dfb4ae
-
SHA1
57515c6ae130956ffad0b79e43f322bfc8809e8b
-
SHA256
94d5ae224bc9fa797fd38b0dcc069f433dbce12d69d60f3e763da1e660d0a023
-
SHA512
76edf24dc9e1e86cde38a2a94933f8ba77f3a90c5d146a89bf95a88d188a41f19ee24ecf2fd74c1ed4bd78ab1679a7ab0ed5eb6145581438e94a85a49850e203
-
SSDEEP
1536:zLHd0Wmjsy5qAKee6YM+vROyfgSRuJ8YBrqi0jyG9QdG0:vHyay5fDe5vROw/YboT9Z0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2764 d3d10b59be88134d921e7c98b5dfb4ae.exe -
Executes dropped EXE 1 IoCs
pid Process 2764 d3d10b59be88134d921e7c98b5dfb4ae.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3160 d3d10b59be88134d921e7c98b5dfb4ae.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3160 d3d10b59be88134d921e7c98b5dfb4ae.exe 2764 d3d10b59be88134d921e7c98b5dfb4ae.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3160 wrote to memory of 2764 3160 d3d10b59be88134d921e7c98b5dfb4ae.exe 90 PID 3160 wrote to memory of 2764 3160 d3d10b59be88134d921e7c98b5dfb4ae.exe 90 PID 3160 wrote to memory of 2764 3160 d3d10b59be88134d921e7c98b5dfb4ae.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3d10b59be88134d921e7c98b5dfb4ae.exe"C:\Users\Admin\AppData\Local\Temp\d3d10b59be88134d921e7c98b5dfb4ae.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\d3d10b59be88134d921e7c98b5dfb4ae.exeC:\Users\Admin\AppData\Local\Temp\d3d10b59be88134d921e7c98b5dfb4ae.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2764
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD55ca277cd26c5d207d8a4e17a2c2c6780
SHA1b64728a8bf9f18884214490113c1fb5831b674c2
SHA2563aecd807ef5f3ea4587b64b02717a7886421ff77aafda326e27e6586b51451cb
SHA51269c4194ecce618d71aae4929cc572b2be50cad27582766d6008db6e1f365004225330c720f868b87d683b5e771932fd6808a2bd2e7021623837bedeba91f154b