Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
0135a7b86d570a54c1907f53eb76bcac.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0135a7b86d570a54c1907f53eb76bcac.exe
Resource
win10v2004-20231215-en
General
-
Target
0135a7b86d570a54c1907f53eb76bcac.exe
-
Size
385KB
-
MD5
0135a7b86d570a54c1907f53eb76bcac
-
SHA1
213748ea8e78f6566f8d82adda44a0787b384a48
-
SHA256
f42d2f4249de916692005a3d3d8feb57d0dd5e4dcbc908697b25935476c9717d
-
SHA512
c0620658e887972b532182c794c1424d75aacc5ffa91d225154c71b7f12418eaa65bf757cff9b880c59dd49c92ba60d81fc53e542d1124b14115ac8a1249f5db
-
SSDEEP
12288:S6wylQKsLKJJAdnDRWoG3SllL7kNCtWTPB:VwylQCohG3slLRaB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1876 0135a7b86d570a54c1907f53eb76bcac.exe -
Executes dropped EXE 1 IoCs
pid Process 1876 0135a7b86d570a54c1907f53eb76bcac.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1628 0135a7b86d570a54c1907f53eb76bcac.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1628 0135a7b86d570a54c1907f53eb76bcac.exe 1876 0135a7b86d570a54c1907f53eb76bcac.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1876 1628 0135a7b86d570a54c1907f53eb76bcac.exe 89 PID 1628 wrote to memory of 1876 1628 0135a7b86d570a54c1907f53eb76bcac.exe 89 PID 1628 wrote to memory of 1876 1628 0135a7b86d570a54c1907f53eb76bcac.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\0135a7b86d570a54c1907f53eb76bcac.exe"C:\Users\Admin\AppData\Local\Temp\0135a7b86d570a54c1907f53eb76bcac.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\0135a7b86d570a54c1907f53eb76bcac.exeC:\Users\Admin\AppData\Local\Temp\0135a7b86d570a54c1907f53eb76bcac.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
362KB
MD53fd17be2e2631c2b4c63885bb0b3ac87
SHA15f08b33e7fee7c02667a4a097a5f1abb4fc4714d
SHA256c8cc7b930eec0c9b8b17ddf836442b268c49b7835c5b362aa49170173c7438b3
SHA5124f2751aea48e7521ff11e31484595cf6f0186ca486cb490b957438fd81ce73c6df76f4a2c0d848385fc2b6ea3ccc94f308fa01471733bed84033c71312cf7ad0