Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
166s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 15:18
Static task
static1
Behavioral task
behavioral1
Sample
036cd00ff59f43d34bef1848b9c78e47.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
036cd00ff59f43d34bef1848b9c78e47.exe
Resource
win10v2004-20231215-en
General
-
Target
036cd00ff59f43d34bef1848b9c78e47.exe
-
Size
385KB
-
MD5
036cd00ff59f43d34bef1848b9c78e47
-
SHA1
bfc6b7540ede8dface8176eda50a28ba60103b84
-
SHA256
739eefad9371be4eda0296851c48f2401132d674520b0f455d6843b342a41d2e
-
SHA512
8e97b23d14e5bfa45b1fe2f7ecfa4def78590e5eb0c376904086137c2676887ab8ef3d7136a6deb57877b0e2d80cb52195e1ff3d61b6eda52410d109c7ec8b89
-
SSDEEP
12288:31oLuNzLZ6nw4N4ur7tnQ6H6jN+NK698Yv4kUB:31eCgNue7tQ+4N+N6Yv4kUB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1564 036cd00ff59f43d34bef1848b9c78e47.exe -
Executes dropped EXE 1 IoCs
pid Process 1564 036cd00ff59f43d34bef1848b9c78e47.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3280 036cd00ff59f43d34bef1848b9c78e47.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3280 036cd00ff59f43d34bef1848b9c78e47.exe 1564 036cd00ff59f43d34bef1848b9c78e47.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3280 wrote to memory of 1564 3280 036cd00ff59f43d34bef1848b9c78e47.exe 89 PID 3280 wrote to memory of 1564 3280 036cd00ff59f43d34bef1848b9c78e47.exe 89 PID 3280 wrote to memory of 1564 3280 036cd00ff59f43d34bef1848b9c78e47.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\036cd00ff59f43d34bef1848b9c78e47.exe"C:\Users\Admin\AppData\Local\Temp\036cd00ff59f43d34bef1848b9c78e47.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\036cd00ff59f43d34bef1848b9c78e47.exeC:\Users\Admin\AppData\Local\Temp\036cd00ff59f43d34bef1848b9c78e47.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD54e34e2410c6bb0acf0e0a2162d53f2db
SHA1644a58780a24fbc7e7adecca43030b07f153cb8f
SHA2560a7cdce2cdd51f40f311662667edf6c636050a6915f85e1c50cf44e19b9377b3
SHA51239ea3929de5c4733974c8b27d583c90f8f678396c6797a02a1e95536189ec6dc904a679808e4b0720694e176b9466f5e14f39a35c2703f25df60acfc6f696442