Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 20:00
Behavioral task
behavioral1
Sample
e23901511e5392f63b2184949dd766da.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e23901511e5392f63b2184949dd766da.exe
Resource
win10v2004-20231215-en
General
-
Target
e23901511e5392f63b2184949dd766da.exe
-
Size
2.7MB
-
MD5
e23901511e5392f63b2184949dd766da
-
SHA1
1bb314e5b35ce6abe8dd61ef1740be39134408b7
-
SHA256
9d9445847bc385342bc0deb446beefd926874adad420f6c3bbd8b4a733838df3
-
SHA512
c93095d6c88b88489d6dec7c0900074d1f8ad5d6d1caee1c7a14762a67a83897cf0cbd1c3608cf62d8b4a89af620fa5352c90561ed62dc90466190f782b7b8b6
-
SSDEEP
49152:tWtrAIWnLBuLggCVTTRkO+NJ4ybndZHAZtinHhQ1:UJNWnLBxbRF8lndZ0tABS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1996 e23901511e5392f63b2184949dd766da.exe -
Executes dropped EXE 1 IoCs
pid Process 1996 e23901511e5392f63b2184949dd766da.exe -
resource yara_rule behavioral2/memory/3068-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000e00000002314f-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3068 e23901511e5392f63b2184949dd766da.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3068 e23901511e5392f63b2184949dd766da.exe 1996 e23901511e5392f63b2184949dd766da.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1996 3068 e23901511e5392f63b2184949dd766da.exe 85 PID 3068 wrote to memory of 1996 3068 e23901511e5392f63b2184949dd766da.exe 85 PID 3068 wrote to memory of 1996 3068 e23901511e5392f63b2184949dd766da.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e23901511e5392f63b2184949dd766da.exe"C:\Users\Admin\AppData\Local\Temp\e23901511e5392f63b2184949dd766da.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\e23901511e5392f63b2184949dd766da.exeC:\Users\Admin\AppData\Local\Temp\e23901511e5392f63b2184949dd766da.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1996
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5d86ae4701ef366439329a46d8d16167c
SHA18550a035a0e45aa4c12712e026b46bb7fce98133
SHA256eceb2382f1aad25975d72fccd7d07cce1aefb83940b934f332afa2baf70aeb02
SHA512475aaa83b455f6b7472dfef78d56a296f5dbf3ba7f31bc69cd665dc4b2ec211b85398a9edf168be493e6b26019df049de199add66645c1cf34b3a6e959b40296