Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
d5f714acefb6b2382c97a4d4d914fe41.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d5f714acefb6b2382c97a4d4d914fe41.exe
Resource
win10v2004-20240226-en
General
-
Target
d5f714acefb6b2382c97a4d4d914fe41.exe
-
Size
1.6MB
-
MD5
d5f714acefb6b2382c97a4d4d914fe41
-
SHA1
a815b10ae1fbe59717f9514c2c2bb69760b79706
-
SHA256
3a28bc4aec1ba0c0bab780725c75ccf9d501cab409582dcd11497410606382b8
-
SHA512
e8d07e2e024beef73a399fd96f1ff56caf8215f1d59fd1baf1fc55caba21db00532ce8d857b1cd56234bfd89fd140b2064dd01aff1f004efc0bae48eff31d37c
-
SSDEEP
49152:vlwUA8W2QelraEt2rxpn4MpAxfFKKbo3VEb0HKrQ26tMc:tA83lZrtW14bAtVY0HKrQ2O
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2892 d5f714acefb6b2382c97a4d4d914fe41.exe -
Executes dropped EXE 1 IoCs
pid Process 2892 d5f714acefb6b2382c97a4d4d914fe41.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1464 d5f714acefb6b2382c97a4d4d914fe41.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1464 d5f714acefb6b2382c97a4d4d914fe41.exe 2892 d5f714acefb6b2382c97a4d4d914fe41.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1464 wrote to memory of 2892 1464 d5f714acefb6b2382c97a4d4d914fe41.exe 89 PID 1464 wrote to memory of 2892 1464 d5f714acefb6b2382c97a4d4d914fe41.exe 89 PID 1464 wrote to memory of 2892 1464 d5f714acefb6b2382c97a4d4d914fe41.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5f714acefb6b2382c97a4d4d914fe41.exe"C:\Users\Admin\AppData\Local\Temp\d5f714acefb6b2382c97a4d4d914fe41.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\d5f714acefb6b2382c97a4d4d914fe41.exeC:\Users\Admin\AppData\Local\Temp\d5f714acefb6b2382c97a4d4d914fe41.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2892
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD51b7c4acfdd0462351ab4cb71a0b51ecb
SHA1a8a74b0c218526bde92d9c7fe589c24d618c4ba1
SHA256fee3cc65073949ad6c3865df51cfe5a4260eba2d54a05cdb9d18fbbda9b58ff4
SHA5127465a7e92c6d8c78b8cc5d5aa45089d36494cd8752d533c3750ae1305521312f8265f0bec4e7b8d33ee197713ca3f335d43ae8a599fb21242217bc0f8c73e9f6