Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
07cf7c4db78f52d6b2434b009849d833.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07cf7c4db78f52d6b2434b009849d833.exe
Resource
win10v2004-20231215-en
General
-
Target
07cf7c4db78f52d6b2434b009849d833.exe
-
Size
771KB
-
MD5
07cf7c4db78f52d6b2434b009849d833
-
SHA1
a576e97519e92d989fa20977266e0cf8d929c239
-
SHA256
049f1a56ba069fc36b89abf331e8af4f8e11880a72810eb28faecaea0cb6f26a
-
SHA512
184ca5e206f8aa05e7378f376e6e1087edaadab7ac217410ccf943d685e040a4aacb2a49a71346869a201c65bcab00fce989aadee85d7e1a1327ce0b791ef1f2
-
SSDEEP
24576:cvMikgSc4/G0A5ldrb10hJaothZ2/T6FBBB:cdkgSrCD/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3868 07cf7c4db78f52d6b2434b009849d833.exe -
Executes dropped EXE 1 IoCs
pid Process 3868 07cf7c4db78f52d6b2434b009849d833.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1520 07cf7c4db78f52d6b2434b009849d833.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1520 07cf7c4db78f52d6b2434b009849d833.exe 3868 07cf7c4db78f52d6b2434b009849d833.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1520 wrote to memory of 3868 1520 07cf7c4db78f52d6b2434b009849d833.exe 91 PID 1520 wrote to memory of 3868 1520 07cf7c4db78f52d6b2434b009849d833.exe 91 PID 1520 wrote to memory of 3868 1520 07cf7c4db78f52d6b2434b009849d833.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\07cf7c4db78f52d6b2434b009849d833.exe"C:\Users\Admin\AppData\Local\Temp\07cf7c4db78f52d6b2434b009849d833.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\07cf7c4db78f52d6b2434b009849d833.exeC:\Users\Admin\AppData\Local\Temp\07cf7c4db78f52d6b2434b009849d833.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD549fca50baa213d8480265eadd7612f7f
SHA1e1a09a66cad513b9caad3adbccb2228bd15f4f77
SHA256b2901fe07c128a3057ac939b3d15e625a83c544fe0bc119c1739422e89ef88c9
SHA512352735300c4364033b30b483047f60febafeaabdd8b251b76b5273ff3e70416750ac68a326280a116c83114ac30f9724ff56c9618a6c81e2ec654fb9d596a3d1