Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 03:45
Behavioral task
behavioral1
Sample
e0b0b7d27833fc7b755a77fa58265bf9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e0b0b7d27833fc7b755a77fa58265bf9.exe
Resource
win10v2004-20240226-en
General
-
Target
e0b0b7d27833fc7b755a77fa58265bf9.exe
-
Size
5.3MB
-
MD5
e0b0b7d27833fc7b755a77fa58265bf9
-
SHA1
fa7f4ce04e86527235ee1d7777b5aac594870985
-
SHA256
c9cb9c196105edb12c5c67e46dad896953159abe3e9fce43ee79aa2d1abc3789
-
SHA512
69c45b1b504b0bebf0a18d228f33b584606fe57efce36a8f7d5d4311ca7cb9fe3e78473efd6d69d42786ae6d8a43c526f8b0de763635b902f2327ee28c85e235
-
SSDEEP
98304:/KN8N5rcFRD6SI4HBUCczzMHBCppAakYacXRH7V774HBUCczzMO:yXWC1C3AUacXRHJUWCq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2920 e0b0b7d27833fc7b755a77fa58265bf9.exe -
Executes dropped EXE 1 IoCs
pid Process 2920 e0b0b7d27833fc7b755a77fa58265bf9.exe -
resource yara_rule behavioral2/memory/1500-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000400000001e5eb-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1500 e0b0b7d27833fc7b755a77fa58265bf9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1500 e0b0b7d27833fc7b755a77fa58265bf9.exe 2920 e0b0b7d27833fc7b755a77fa58265bf9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1500 wrote to memory of 2920 1500 e0b0b7d27833fc7b755a77fa58265bf9.exe 91 PID 1500 wrote to memory of 2920 1500 e0b0b7d27833fc7b755a77fa58265bf9.exe 91 PID 1500 wrote to memory of 2920 1500 e0b0b7d27833fc7b755a77fa58265bf9.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0b0b7d27833fc7b755a77fa58265bf9.exe"C:\Users\Admin\AppData\Local\Temp\e0b0b7d27833fc7b755a77fa58265bf9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\e0b0b7d27833fc7b755a77fa58265bf9.exeC:\Users\Admin\AppData\Local\Temp\e0b0b7d27833fc7b755a77fa58265bf9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2920
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD515dd6518ed15afc56e76d331fdc2102a
SHA16b1ca6ebead43107db90557e46f2ac3a1c8c0efa
SHA2569d8057a26ce21e4c127bba11d6836e0ed7b1b3782fe4e94ec58a4c2da05a336a
SHA512f03c83926c14bf7e1bbe7f5199a17e1ddc5708385d83368bcc83e845365b435c29235ec6e4785974cd84e36e37111b477f0c8b9277aacfc92c7a75ce3ed9dc77