Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
014534e03be7442802230a0bd4249017.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
014534e03be7442802230a0bd4249017.exe
Resource
win10v2004-20231222-en
General
-
Target
014534e03be7442802230a0bd4249017.exe
-
Size
907KB
-
MD5
014534e03be7442802230a0bd4249017
-
SHA1
3ccb08aab26cd8f91c26499f37ff556fe5417e50
-
SHA256
588dda440a939d0f82a580a95091fc8e5d544454d0314153fbc90f8e63e32be5
-
SHA512
4526378cebbb0cb5830c7285cab23ad7fa90f04768994a8b327839e360eabdac47254605774148b64a966a74a810e62a9ef5bce1f88d75491afb6c85d0b383f1
-
SSDEEP
24576:HxofkXlT8xD1Xja1DXrEIUUaCitd6tUZxOa/ZS1:HxofIT87jKXQga5S+OgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1592 014534e03be7442802230a0bd4249017.exe -
Executes dropped EXE 1 IoCs
pid Process 1592 014534e03be7442802230a0bd4249017.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4360 014534e03be7442802230a0bd4249017.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4360 014534e03be7442802230a0bd4249017.exe 1592 014534e03be7442802230a0bd4249017.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4360 wrote to memory of 1592 4360 014534e03be7442802230a0bd4249017.exe 20 PID 4360 wrote to memory of 1592 4360 014534e03be7442802230a0bd4249017.exe 20 PID 4360 wrote to memory of 1592 4360 014534e03be7442802230a0bd4249017.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\014534e03be7442802230a0bd4249017.exe"C:\Users\Admin\AppData\Local\Temp\014534e03be7442802230a0bd4249017.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\014534e03be7442802230a0bd4249017.exeC:\Users\Admin\AppData\Local\Temp\014534e03be7442802230a0bd4249017.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5d47697a23ac96446ad246444929891da
SHA115d614119c16a8052a1b712d402c9055c9ab824f
SHA256a2ef8424974fcdd80f5085ea98dee702cce7b253b7122b6c8c4a75856b07b642
SHA512172c86ab4b5898b319ed0006b98e1f06f755b90e8e8d39fae6d24e59ca1379c03cad221e7aa85c9f78cf234b13d1749b19ab12d8c8c05155c8d8bc0689a8c2a0