Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 12:00
Behavioral task
behavioral1
Sample
d60ef7dd3f5f10dbb9e281341019e8e0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d60ef7dd3f5f10dbb9e281341019e8e0.exe
Resource
win10v2004-20240226-en
General
-
Target
d60ef7dd3f5f10dbb9e281341019e8e0.exe
-
Size
1.5MB
-
MD5
d60ef7dd3f5f10dbb9e281341019e8e0
-
SHA1
2f365904af7b142cd0063b21047f5d0108fb4927
-
SHA256
8387066f2b400cf334379ac317eba13e766b37be8226139eb79f9b261199612a
-
SHA512
7784e7daabae6858dad403d748ddd574e2c0485c47b1f4b5b7165031a7de79d3220194505b987f88bf4c91eefc35349ae344acfda4cf022f782506b6cd8fcc08
-
SSDEEP
24576:yBiQtQnrxVkNUwAL9IToI7b933ifQa9BoMBylFwy+7xvq5qTEwKBKO32fJ+sptPF:yBiiCrUNe9tfQkuMcd+9S5gmBl32fJoV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4612 d60ef7dd3f5f10dbb9e281341019e8e0.exe -
Executes dropped EXE 1 IoCs
pid Process 4612 d60ef7dd3f5f10dbb9e281341019e8e0.exe -
resource yara_rule behavioral2/memory/2784-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023215-11.dat upx behavioral2/memory/4612-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2784 d60ef7dd3f5f10dbb9e281341019e8e0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2784 d60ef7dd3f5f10dbb9e281341019e8e0.exe 4612 d60ef7dd3f5f10dbb9e281341019e8e0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2784 wrote to memory of 4612 2784 d60ef7dd3f5f10dbb9e281341019e8e0.exe 90 PID 2784 wrote to memory of 4612 2784 d60ef7dd3f5f10dbb9e281341019e8e0.exe 90 PID 2784 wrote to memory of 4612 2784 d60ef7dd3f5f10dbb9e281341019e8e0.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d60ef7dd3f5f10dbb9e281341019e8e0.exe"C:\Users\Admin\AppData\Local\Temp\d60ef7dd3f5f10dbb9e281341019e8e0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\d60ef7dd3f5f10dbb9e281341019e8e0.exeC:\Users\Admin\AppData\Local\Temp\d60ef7dd3f5f10dbb9e281341019e8e0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4612
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD550519efb33d05a33113d4e1aeff14c7e
SHA1836656207890aab90413e7f9bab0472a1a8fdc16
SHA2560d83808853e592a0c18afb7322cbc8a14da0439c6f6d2689a93eb37294ecf9ca
SHA512c16fbe14e25f93a44a256d7fe7b14ec762e59d5e61758e1a90b0351348867503a56c9d536f04bd426551b99b1c628b4ad86467c556c64134c8d8c0d44e35b351