Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 02:20
Behavioral task
behavioral1
Sample
e0896bc5b3cee2fa264b25f70c883294.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e0896bc5b3cee2fa264b25f70c883294.exe
Resource
win10v2004-20231215-en
General
-
Target
e0896bc5b3cee2fa264b25f70c883294.exe
-
Size
2.7MB
-
MD5
e0896bc5b3cee2fa264b25f70c883294
-
SHA1
cddcef82dad6d0a8d2aa771b30191464cfd24006
-
SHA256
6eee158a3739c38786245f8afb491d92591eb5616dfbe898607fa35bc645f33c
-
SHA512
a7a2cfc630b5c6ff3cb0e4e934a1715d48f8d6a76977f47b3d704a7d92658a1dd6a52ec51d9f71073c4242b0c870de6930845311e70d76879cad1de14e919782
-
SSDEEP
49152:qokRSNkL2CZwsqFN1OYn0TbbuPvR9TJdlB4011X3rTEK4lhVMqJtKZJhJX9HR9j:qDwkLhOLFvOxTsHTJdzz1HrYK4nm6+Jx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1140 e0896bc5b3cee2fa264b25f70c883294.exe -
Executes dropped EXE 1 IoCs
pid Process 1140 e0896bc5b3cee2fa264b25f70c883294.exe -
resource yara_rule behavioral2/memory/3632-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/memory/1140-14-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000c00000002315b-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3632 e0896bc5b3cee2fa264b25f70c883294.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3632 e0896bc5b3cee2fa264b25f70c883294.exe 1140 e0896bc5b3cee2fa264b25f70c883294.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3632 wrote to memory of 1140 3632 e0896bc5b3cee2fa264b25f70c883294.exe 84 PID 3632 wrote to memory of 1140 3632 e0896bc5b3cee2fa264b25f70c883294.exe 84 PID 3632 wrote to memory of 1140 3632 e0896bc5b3cee2fa264b25f70c883294.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0896bc5b3cee2fa264b25f70c883294.exe"C:\Users\Admin\AppData\Local\Temp\e0896bc5b3cee2fa264b25f70c883294.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\e0896bc5b3cee2fa264b25f70c883294.exeC:\Users\Admin\AppData\Local\Temp\e0896bc5b3cee2fa264b25f70c883294.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1140
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5132a5415f5558f900d5a144279f647d4
SHA1cd03d3a4bbc1152755d0895e0fcea568a7b65a4d
SHA25672928d844c4ec828680346bb226bc8fcdd37af8ae638e50354f072e9b4dcf0ef
SHA5120c716f96243b4d5d9ad1d682e2e4a9d98d9861b3d6d8f4988d37438991f12a0720c8a83513082d4cef24eefaea7c761248fd71495b406c1e4ad3b61c94ee0915