Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
7s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 10:23
Behavioral task
behavioral1
Sample
deeef6cb6bd552fac36dfc1b9c3e7dac.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
deeef6cb6bd552fac36dfc1b9c3e7dac.exe
Resource
win10v2004-20240226-en
General
-
Target
deeef6cb6bd552fac36dfc1b9c3e7dac.exe
-
Size
2.0MB
-
MD5
deeef6cb6bd552fac36dfc1b9c3e7dac
-
SHA1
9325da20ad2a14f849c6be51df12689b0132e196
-
SHA256
e0db3439a5592b527db3582a8a543d788b5ae67591f92f9c7ad94fc8245ae645
-
SHA512
201d34c491baee9e9007887c6d35f373f5276952243287095cf68c5e060acbedf361d0bb66b48c77d57ea4a7b56b699c38f8fd7aad6788a6761b0f9e7322a91e
-
SSDEEP
49152:fCTQ5VAM8Lt0EbPhFSTs09Os4Lwy/Rhxl6uuVBpTEmVSr157RbuSTs09Os4Lwy/S:fCEVj8Lt0EbPhFSTt9Os4Ltbxl6RzQmk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3720 deeef6cb6bd552fac36dfc1b9c3e7dac.exe -
resource yara_rule behavioral2/memory/4968-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/files/0x0008000000023349-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4968 deeef6cb6bd552fac36dfc1b9c3e7dac.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4968 deeef6cb6bd552fac36dfc1b9c3e7dac.exe 3720 deeef6cb6bd552fac36dfc1b9c3e7dac.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4968 wrote to memory of 3720 4968 deeef6cb6bd552fac36dfc1b9c3e7dac.exe 98 PID 4968 wrote to memory of 3720 4968 deeef6cb6bd552fac36dfc1b9c3e7dac.exe 98 PID 4968 wrote to memory of 3720 4968 deeef6cb6bd552fac36dfc1b9c3e7dac.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\deeef6cb6bd552fac36dfc1b9c3e7dac.exe"C:\Users\Admin\AppData\Local\Temp\deeef6cb6bd552fac36dfc1b9c3e7dac.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\deeef6cb6bd552fac36dfc1b9c3e7dac.exeC:\Users\Admin\AppData\Local\Temp\deeef6cb6bd552fac36dfc1b9c3e7dac.exe2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3720
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5c773c590fe7ac93b2cb063b56458f537
SHA141d558762de64abbade5400f7763bc9e9597e905
SHA256b6a10915344038824af61333f36ca69c68c9e91e3b0cf1b316350dad1d6c66c3
SHA5124a580af2b792c6d20311dfeab2e57682e7b8e4d3f419507bb22ddbf5fc15b8b688abd5cb92356b01126aee848b62d172bcd181e1e6387ae671fa7deed792733c