Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
1d2359845d6620fdac8650dde7f29b92.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1d2359845d6620fdac8650dde7f29b92.exe
Resource
win10v2004-20231222-en
General
-
Target
1d2359845d6620fdac8650dde7f29b92.exe
-
Size
907KB
-
MD5
1d2359845d6620fdac8650dde7f29b92
-
SHA1
21ed7c2e2d6acec82811885f9e2948876b07f154
-
SHA256
95c326ac660efe4830cf58456b98b4ceb45973fb4492ef4fd891245a143afcc7
-
SHA512
98546fc41bf5da5ee83b7039fb960b4a39381dccb0db30a70b1ed1b1463a4729968e32502673feb5938bc271b9a1be9ca94b57eb4096954d906e14f90314c5f1
-
SSDEEP
12288:+6kDiC3692/nMxwTsubvZ5vsMJ3RN2c35C9kaAGqiUFE0Xp5JWBUVekStUDjVDaq:v4M+Nv3ESaT1UK2p58BlkZa/ZS1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1116 1d2359845d6620fdac8650dde7f29b92.exe -
Executes dropped EXE 1 IoCs
pid Process 1116 1d2359845d6620fdac8650dde7f29b92.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2908 1d2359845d6620fdac8650dde7f29b92.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2908 1d2359845d6620fdac8650dde7f29b92.exe 1116 1d2359845d6620fdac8650dde7f29b92.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2908 wrote to memory of 1116 2908 1d2359845d6620fdac8650dde7f29b92.exe 18 PID 2908 wrote to memory of 1116 2908 1d2359845d6620fdac8650dde7f29b92.exe 18 PID 2908 wrote to memory of 1116 2908 1d2359845d6620fdac8650dde7f29b92.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d2359845d6620fdac8650dde7f29b92.exe"C:\Users\Admin\AppData\Local\Temp\1d2359845d6620fdac8650dde7f29b92.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\1d2359845d6620fdac8650dde7f29b92.exeC:\Users\Admin\AppData\Local\Temp\1d2359845d6620fdac8650dde7f29b92.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5ec14432724ba98f6f741cccae4616517
SHA12b38ea1a26392dfba55963e4b7aa27c36d6079c7
SHA256b971a4ec79ed0bd68c51ae08633919245ce6b001c84d23fca79e4acd5cbbc9dc
SHA512abe0f3915d101f2d0b0444b62765f0fb81053ee38bb26f00146210204f70df51bc8d6af31e2b481b269aed75d0c74856386a92ed0a4ab50ed16900ec93e7c14f