Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
19a01985cb0df7732e9f1bb115a5caea.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
19a01985cb0df7732e9f1bb115a5caea.exe
Resource
win10v2004-20231215-en
General
-
Target
19a01985cb0df7732e9f1bb115a5caea.exe
-
Size
385KB
-
MD5
19a01985cb0df7732e9f1bb115a5caea
-
SHA1
cff69c90814ce1c2eecf2708c931a14f7758d557
-
SHA256
427a0b3afda1ffd1e88c84abd443c594ca1c2478b3a48f9347afdf87e2039f65
-
SHA512
0555fa76eafcaae454119780ec643cfec1f03aaa12a8f375f3f41cb06ef1a84e25bc3ce6075615b30962ef9882c98a471eb79fae6469a32afa5027c96fa52392
-
SSDEEP
6144:u/MtwMdkRfhkZGNds3+781eb4V5i1yfmsBuTNfjbvbMNsKGTGqsk/llOo5B:u0tbMgt3QLb85eyfFwNf3vjsktkKB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3160 19a01985cb0df7732e9f1bb115a5caea.exe -
Executes dropped EXE 1 IoCs
pid Process 3160 19a01985cb0df7732e9f1bb115a5caea.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4656 19a01985cb0df7732e9f1bb115a5caea.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4656 19a01985cb0df7732e9f1bb115a5caea.exe 3160 19a01985cb0df7732e9f1bb115a5caea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4656 wrote to memory of 3160 4656 19a01985cb0df7732e9f1bb115a5caea.exe 18 PID 4656 wrote to memory of 3160 4656 19a01985cb0df7732e9f1bb115a5caea.exe 18 PID 4656 wrote to memory of 3160 4656 19a01985cb0df7732e9f1bb115a5caea.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\19a01985cb0df7732e9f1bb115a5caea.exe"C:\Users\Admin\AppData\Local\Temp\19a01985cb0df7732e9f1bb115a5caea.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\19a01985cb0df7732e9f1bb115a5caea.exeC:\Users\Admin\AppData\Local\Temp\19a01985cb0df7732e9f1bb115a5caea.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD51e4073c4b1211e701cf0409416330296
SHA1abf9485753f4f18a686bc6e6865295a6b1924ce7
SHA25669117a33b2b02660f55b9e73b7e9e57b69b50d5b24f2822076ae2a7a26db4a98
SHA512793cefd68dc2d19dea925238856a550d9968229f95a8059593887470f1482fc372d7454d8a8d82e05684ab02aaa6aacd1ca59f5dfab900a75f37a5777890d975