Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/05/2024, 18:14

General

  • Target

    02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe

  • Size

    91KB

  • MD5

    e21ea08c8546156374b27a1323d2ee07

  • SHA1

    70fd54b761167b92b7ef4dd30c1ee403eed2b9a0

  • SHA256

    02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a

  • SHA512

    db1b98cd67fb724f5c07a061204eed59e625a75d0cd90246ba71c7c21f6629c1e8a54aaa69e3457c65b7e43a2c4d40e4497c64bcfa07039b375d9a95591ef149

  • SSDEEP

    1536:St70Jhfnn5sjRK/gAaJHcFOLX1rogiMD+fJnG/FZSt5ox7EQjTaAv5jMBR:K70JhfnnaVJHdygiXRGdZa5ovf1e

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe
    "C:\Users\Admin\AppData\Local\Temp\02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Users\Admin\AppData\Local\Temp\02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe
      C:\Users\Admin\AppData\Local\Temp\02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4568

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe

    Filesize

    91KB

    MD5

    1a5f67f3fd813c7f653135e205d945fc

    SHA1

    153f753a6d410341c7acce2a82ac5e45fafaf8f7

    SHA256

    b6a1c2b93d4929a6fd9cc47f7e75923f10efaefc236d5c3dd270e74fb2a9b33d

    SHA512

    756831c62cdf1f06762b8f83ab0e4f6e8d967f235cf353c294fb1102caedb3303cea85b9b5c27a4cc2a92c386c5f92381a7221e2b890bed7cbd178f99178597a

  • memory/4408-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/4408-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4408-6-0x0000000001440000-0x0000000001473000-memory.dmp

    Filesize

    204KB

  • memory/4408-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4568-13-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/4568-19-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4568-24-0x00000000001B0000-0x00000000001E3000-memory.dmp

    Filesize

    204KB

  • memory/4568-25-0x00000000014F0000-0x000000000150B000-memory.dmp

    Filesize

    108KB