Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
d54a32519b34cfb6f3271fbe7e64d36c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d54a32519b34cfb6f3271fbe7e64d36c.exe
Resource
win10v2004-20240226-en
General
-
Target
d54a32519b34cfb6f3271fbe7e64d36c.exe
-
Size
82KB
-
MD5
d54a32519b34cfb6f3271fbe7e64d36c
-
SHA1
f46c09dc804e8cf6e65e337bc94302ef7d908935
-
SHA256
e8ccf056929232c80e409cd1a177fa366a7817fa22b1d7ffd219fdb7541e5be9
-
SHA512
e0a47c45ed37af3ab6123c3a83194cc3a3b7f46089af85b8b8e5da3405dc30183ec2c7dc3365dd4f364c940746daf6dd5392fa8f0128cb9bdb1913fa9a348a5d
-
SSDEEP
1536:u44Z3tmTYHRR5Y8tnamajTStfJQ6SkNtvLf43CMq1yOARKIy:AITURg+afOQ6tNtvizS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3628 d54a32519b34cfb6f3271fbe7e64d36c.exe -
Executes dropped EXE 1 IoCs
pid Process 3628 d54a32519b34cfb6f3271fbe7e64d36c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2112 d54a32519b34cfb6f3271fbe7e64d36c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2112 d54a32519b34cfb6f3271fbe7e64d36c.exe 3628 d54a32519b34cfb6f3271fbe7e64d36c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3628 2112 d54a32519b34cfb6f3271fbe7e64d36c.exe 91 PID 2112 wrote to memory of 3628 2112 d54a32519b34cfb6f3271fbe7e64d36c.exe 91 PID 2112 wrote to memory of 3628 2112 d54a32519b34cfb6f3271fbe7e64d36c.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\d54a32519b34cfb6f3271fbe7e64d36c.exe"C:\Users\Admin\AppData\Local\Temp\d54a32519b34cfb6f3271fbe7e64d36c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\d54a32519b34cfb6f3271fbe7e64d36c.exeC:\Users\Admin\AppData\Local\Temp\d54a32519b34cfb6f3271fbe7e64d36c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3628
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5f10b1588bcca68d3ac06825f185751e3
SHA1977eda0ee25756f80a0110ed42742f8dd2f842d9
SHA256d28ed77d95dfd253235c7f0b8a4ea9ccd556f0a9f20beaa1ea635641c789c841
SHA5121cc1ad88c78dd19480686b06e9c027a0bb73da58584de0640ea64d6eb126ae874ed4ee71b692f03983a41db7c516ea2844d7a9cbcb7b29297a50a239d294e2d7