Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 21:06
Behavioral task
behavioral1
Sample
d4878bf517b84e49c3377adb1ad8038d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d4878bf517b84e49c3377adb1ad8038d.exe
Resource
win10v2004-20240226-en
General
-
Target
d4878bf517b84e49c3377adb1ad8038d.exe
-
Size
2.9MB
-
MD5
d4878bf517b84e49c3377adb1ad8038d
-
SHA1
4c4164f543d64416962598f4ce0e3289dfd4b36e
-
SHA256
230e5141831452d7f1c26a2640ab4018dd8b3078719d75c7729b0c08b2b29a4f
-
SHA512
1c50f6f2571c33d86bf052dba01607e98fb34549241c8aea421c1a00790058a274d989b5dda3d528f4ebf7881de6070f8450173525ac0f8df76d7475f5a6878a
-
SSDEEP
49152:nmh2LMvCzI4FieFUSfJxt7N74NH5HUyNRcUsCVOzetdZJ:nmoLMviI4iCUkt4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1652 d4878bf517b84e49c3377adb1ad8038d.exe -
Executes dropped EXE 1 IoCs
pid Process 1652 d4878bf517b84e49c3377adb1ad8038d.exe -
resource yara_rule behavioral2/memory/4888-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000300000001e9a0-11.dat upx behavioral2/memory/1652-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4888 d4878bf517b84e49c3377adb1ad8038d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4888 d4878bf517b84e49c3377adb1ad8038d.exe 1652 d4878bf517b84e49c3377adb1ad8038d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4888 wrote to memory of 1652 4888 d4878bf517b84e49c3377adb1ad8038d.exe 88 PID 4888 wrote to memory of 1652 4888 d4878bf517b84e49c3377adb1ad8038d.exe 88 PID 4888 wrote to memory of 1652 4888 d4878bf517b84e49c3377adb1ad8038d.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4878bf517b84e49c3377adb1ad8038d.exe"C:\Users\Admin\AppData\Local\Temp\d4878bf517b84e49c3377adb1ad8038d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\d4878bf517b84e49c3377adb1ad8038d.exeC:\Users\Admin\AppData\Local\Temp\d4878bf517b84e49c3377adb1ad8038d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1652
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5337a0a5192d714de59d3395639f9dba5
SHA17c6ec6bfc34370c8f65d7cff0bc7c1e7b494dc1a
SHA256138d5fd9cc15d6e3563e63401701f584dae47ddc9f8d6833295f62fd75a22539
SHA51263cd016672d82557c5366006206f44ddb539152362191fdb954274028560872168a994ff87dcf2aa9640c7511b1ee8bc1a7fd5674a64bac43252040c40d9d1b2