Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe
Resource
win10v2004-20240426-en
General
-
Target
02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe
-
Size
91KB
-
MD5
e21ea08c8546156374b27a1323d2ee07
-
SHA1
70fd54b761167b92b7ef4dd30c1ee403eed2b9a0
-
SHA256
02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a
-
SHA512
db1b98cd67fb724f5c07a061204eed59e625a75d0cd90246ba71c7c21f6629c1e8a54aaa69e3457c65b7e43a2c4d40e4497c64bcfa07039b375d9a95591ef149
-
SSDEEP
1536:St70Jhfnn5sjRK/gAaJHcFOLX1rogiMD+fJnG/FZSt5ox7EQjTaAv5jMBR:K70JhfnnaVJHdygiXRGdZa5ovf1e
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4568 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe -
Executes dropped EXE 1 IoCs
pid Process 4568 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4408 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4408 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe 4568 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4408 wrote to memory of 4568 4408 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe 85 PID 4408 wrote to memory of 4568 4408 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe 85 PID 4408 wrote to memory of 4568 4408 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe"C:\Users\Admin\AppData\Local\Temp\02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exeC:\Users\Admin\AppData\Local\Temp\02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4568
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe
Filesize91KB
MD51a5f67f3fd813c7f653135e205d945fc
SHA1153f753a6d410341c7acce2a82ac5e45fafaf8f7
SHA256b6a1c2b93d4929a6fd9cc47f7e75923f10efaefc236d5c3dd270e74fb2a9b33d
SHA512756831c62cdf1f06762b8f83ab0e4f6e8d967f235cf353c294fb1102caedb3303cea85b9b5c27a4cc2a92c386c5f92381a7221e2b890bed7cbd178f99178597a