Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 21:33

General

  • Target

    1d2359845d6620fdac8650dde7f29b92.exe

  • Size

    907KB

  • MD5

    1d2359845d6620fdac8650dde7f29b92

  • SHA1

    21ed7c2e2d6acec82811885f9e2948876b07f154

  • SHA256

    95c326ac660efe4830cf58456b98b4ceb45973fb4492ef4fd891245a143afcc7

  • SHA512

    98546fc41bf5da5ee83b7039fb960b4a39381dccb0db30a70b1ed1b1463a4729968e32502673feb5938bc271b9a1be9ca94b57eb4096954d906e14f90314c5f1

  • SSDEEP

    12288:+6kDiC3692/nMxwTsubvZ5vsMJ3RN2c35C9kaAGqiUFE0Xp5JWBUVekStUDjVDaq:v4M+Nv3ESaT1UK2p58BlkZa/ZS1

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d2359845d6620fdac8650dde7f29b92.exe
    "C:\Users\Admin\AppData\Local\Temp\1d2359845d6620fdac8650dde7f29b92.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Users\Admin\AppData\Local\Temp\1d2359845d6620fdac8650dde7f29b92.exe
      C:\Users\Admin\AppData\Local\Temp\1d2359845d6620fdac8650dde7f29b92.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1d2359845d6620fdac8650dde7f29b92.exe

    Filesize

    92KB

    MD5

    ec14432724ba98f6f741cccae4616517

    SHA1

    2b38ea1a26392dfba55963e4b7aa27c36d6079c7

    SHA256

    b971a4ec79ed0bd68c51ae08633919245ce6b001c84d23fca79e4acd5cbbc9dc

    SHA512

    abe0f3915d101f2d0b0444b62765f0fb81053ee38bb26f00146210204f70df51bc8d6af31e2b481b269aed75d0c74856386a92ed0a4ab50ed16900ec93e7c14f

  • memory/1116-13-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1116-16-0x0000000001660000-0x0000000001748000-memory.dmp

    Filesize

    928KB

  • memory/1116-21-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/1116-20-0x0000000005190000-0x000000000524B000-memory.dmp

    Filesize

    748KB

  • memory/1116-35-0x000000000C920000-0x000000000C9B8000-memory.dmp

    Filesize

    608KB

  • memory/1116-32-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2908-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2908-1-0x00000000017D0000-0x00000000018B8000-memory.dmp

    Filesize

    928KB

  • memory/2908-2-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2908-12-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB