Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 13:15
Behavioral task
behavioral1
Sample
de18205d811fcbe6158e492e1e76cc00.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de18205d811fcbe6158e492e1e76cc00.exe
Resource
win10v2004-20240226-en
General
-
Target
de18205d811fcbe6158e492e1e76cc00.exe
-
Size
2.9MB
-
MD5
de18205d811fcbe6158e492e1e76cc00
-
SHA1
2e3711e2f3be38a6e2e7d552eab15f1b370f0c06
-
SHA256
0c223a04a3eeb288383eeed66e45421adc6e0537eed7acb6e5d9468b2647b2a8
-
SHA512
e5bb3e5d007792065c9a2fe7e705ba665e44ac7d30b143966022aa52296f906c647a9def2693a632c41afedf827b71cd5a30b8c4fc83ced55db2b9c656984c06
-
SSDEEP
49152:lICmgFsYbAUOKRGcx23Bn3jBSiD3a9Eh8jmq9s8VAB+PeB6tbKiw8Vdb6X:lICm/YbAKRGcx23Llh8jNtlmYt+4o
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5012 de18205d811fcbe6158e492e1e76cc00.exe -
Executes dropped EXE 1 IoCs
pid Process 5012 de18205d811fcbe6158e492e1e76cc00.exe -
resource yara_rule behavioral2/memory/2676-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000a00000001ea83-11.dat upx behavioral2/memory/5012-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2676 de18205d811fcbe6158e492e1e76cc00.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2676 de18205d811fcbe6158e492e1e76cc00.exe 5012 de18205d811fcbe6158e492e1e76cc00.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2676 wrote to memory of 5012 2676 de18205d811fcbe6158e492e1e76cc00.exe 98 PID 2676 wrote to memory of 5012 2676 de18205d811fcbe6158e492e1e76cc00.exe 98 PID 2676 wrote to memory of 5012 2676 de18205d811fcbe6158e492e1e76cc00.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\de18205d811fcbe6158e492e1e76cc00.exe"C:\Users\Admin\AppData\Local\Temp\de18205d811fcbe6158e492e1e76cc00.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\de18205d811fcbe6158e492e1e76cc00.exeC:\Users\Admin\AppData\Local\Temp\de18205d811fcbe6158e492e1e76cc00.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3956 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:2468
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5ed869a677f64ae7cc67cdaab644a72fa
SHA1d36941dc89a9fe32b32d3ba41bfa53c85553a468
SHA25661370a7b2b29751c02000c05fef7f11006ac252ad5b82bc2df3387a3b8c7e742
SHA512950122d42262d273f8de82860c4358ed961a33b1da33eb5bd06fe6e16974145214dc418a2ce1b6cca279a38ca790b550b753635e1cc00988a7fdfc158d6b925b