Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
025daaecc3765a067eb68dec9e7b3cde.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
025daaecc3765a067eb68dec9e7b3cde.exe
Resource
win10v2004-20231222-en
General
-
Target
025daaecc3765a067eb68dec9e7b3cde.exe
-
Size
771KB
-
MD5
025daaecc3765a067eb68dec9e7b3cde
-
SHA1
40d025e9c8915cd2333e7c943b46596a9c94ac04
-
SHA256
086278fa114e89d40b904a2e712eb3664b6a6ac3b7860a1ae908e0766f8f9023
-
SHA512
24b11c45712a4cd0bbf072c22f9336ac295dd69635af5e118d9a43751f95e2eb55ba9b9587b5e359d687ddfe30beafae6530e5204b0bebb8f1ff765dceab4693
-
SSDEEP
12288:xeNt19Ihj8qS05+y+2oolJY06ACQr5FveEXY5BTb10VHmDXTuFaa2AtyGTKOF25g:+xlmo4zBXWtb10hJaothZ2/T6FBBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1976 025daaecc3765a067eb68dec9e7b3cde.exe -
Executes dropped EXE 1 IoCs
pid Process 1976 025daaecc3765a067eb68dec9e7b3cde.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 224 025daaecc3765a067eb68dec9e7b3cde.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 224 025daaecc3765a067eb68dec9e7b3cde.exe 1976 025daaecc3765a067eb68dec9e7b3cde.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 224 wrote to memory of 1976 224 025daaecc3765a067eb68dec9e7b3cde.exe 19 PID 224 wrote to memory of 1976 224 025daaecc3765a067eb68dec9e7b3cde.exe 19 PID 224 wrote to memory of 1976 224 025daaecc3765a067eb68dec9e7b3cde.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\025daaecc3765a067eb68dec9e7b3cde.exe"C:\Users\Admin\AppData\Local\Temp\025daaecc3765a067eb68dec9e7b3cde.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\025daaecc3765a067eb68dec9e7b3cde.exeC:\Users\Admin\AppData\Local\Temp\025daaecc3765a067eb68dec9e7b3cde.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD595927cdb11dccc6fe948de280e1fca38
SHA1c7c9d02bef7625fa7d6ec9472b396a5a4437ba6e
SHA256a9a9b79572107334538a5046d09ed12d43f1bf569ad372c02eb800025cf53a60
SHA512049811c965e4c2918258aa637311c010f5140a0cd7a1654d5403fe78d23f36c64b973502f25ff08c5fa41b04a8adb488d56de84874ecf421bf5961b8f093f140