Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
440feb17fc2cc307d8708ce6732152a4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
440feb17fc2cc307d8708ce6732152a4.exe
Resource
win10v2004-20231215-en
General
-
Target
440feb17fc2cc307d8708ce6732152a4.exe
-
Size
385KB
-
MD5
440feb17fc2cc307d8708ce6732152a4
-
SHA1
19b5a7881e07475dd7a5024991e5d1d8ac15fe71
-
SHA256
7f4db985fb7c507710c3f027fb62f4f0fcf7f16089af53e2d6118c1960a1e5bc
-
SHA512
a5a8abe3830a9261ba9b8aa1eeb6d86a03bb77be00726df653e07e4960492af9a71a2abd1fe0504c261b10aa422a0cab5d73ee920fc8140d5e598b52ebcb6afe
-
SSDEEP
6144:GXgY/LUEMawhM12KxSdOU5BI+4CbnsUG9XZ9KMhfksii6jWfMaH0O62fxbB:J8QiJ9U5CbCbns51ZMMhX6KfMa9z9B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2264 440feb17fc2cc307d8708ce6732152a4.exe -
Executes dropped EXE 1 IoCs
pid Process 2264 440feb17fc2cc307d8708ce6732152a4.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5048 440feb17fc2cc307d8708ce6732152a4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5048 440feb17fc2cc307d8708ce6732152a4.exe 2264 440feb17fc2cc307d8708ce6732152a4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5048 wrote to memory of 2264 5048 440feb17fc2cc307d8708ce6732152a4.exe 90 PID 5048 wrote to memory of 2264 5048 440feb17fc2cc307d8708ce6732152a4.exe 90 PID 5048 wrote to memory of 2264 5048 440feb17fc2cc307d8708ce6732152a4.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exe"C:\Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exeC:\Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5039b1eb8bb43f43c7b3bb8f17fd2e4a9
SHA18cd4a641b7291d585be1083d4bdad99576dcc348
SHA256eb83bbcc028a3826c14cbc9c030367cbb093c8ec2555567e38ad5b2317340506
SHA512ac11d9a8eff259b3d777ec0bac5a16578c5014e043b7ef6946a961d8281fa161bb12db50e382a4142b9673580b7eee40c6cec411fdb9f1cfde62632aaf79a0b9