Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
1ea5ea071266c5458c1873d73cdca4df.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ea5ea071266c5458c1873d73cdca4df.exe
Resource
win10v2004-20231215-en
General
-
Target
1ea5ea071266c5458c1873d73cdca4df.exe
-
Size
385KB
-
MD5
1ea5ea071266c5458c1873d73cdca4df
-
SHA1
a2b1d6dfd3b96281257b938cd2664d6bc09c857e
-
SHA256
9ce92c2bb59000e548624c0500eac1f1a6d61577681b9374a6bf353beca3372f
-
SHA512
20ffa023c5c9bb69c943759f19a56bfac0eea6695ad67df173a67cc1555fa29de8e7d0a005b2b1ef646df37919a2d9e4afb8c0e94470d2b304ea1103d2c21310
-
SSDEEP
12288:oxNNSv9zTjELFmmcWpyZz7GWNGzPTpTjjoQJ6B:wNa9zHELFZTchTgTpkQJ6B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3908 1ea5ea071266c5458c1873d73cdca4df.exe -
Executes dropped EXE 1 IoCs
pid Process 3908 1ea5ea071266c5458c1873d73cdca4df.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1456 1ea5ea071266c5458c1873d73cdca4df.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1456 1ea5ea071266c5458c1873d73cdca4df.exe 3908 1ea5ea071266c5458c1873d73cdca4df.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1456 wrote to memory of 3908 1456 1ea5ea071266c5458c1873d73cdca4df.exe 18 PID 1456 wrote to memory of 3908 1456 1ea5ea071266c5458c1873d73cdca4df.exe 18 PID 1456 wrote to memory of 3908 1456 1ea5ea071266c5458c1873d73cdca4df.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ea5ea071266c5458c1873d73cdca4df.exe"C:\Users\Admin\AppData\Local\Temp\1ea5ea071266c5458c1873d73cdca4df.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\1ea5ea071266c5458c1873d73cdca4df.exeC:\Users\Admin\AppData\Local\Temp\1ea5ea071266c5458c1873d73cdca4df.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD536a4e6508b87db063743a25e0c54eb52
SHA1a13ad71127d036d73c171d60f90de1bbd8cd99a0
SHA2564a2222cd4473e0b807a29e968356ab9455763c49762054a3ae68e2acbf62855f
SHA5127b904bed42cf5d7a425456dbb170721da0d78a6989927b3cfc07c80a504f0b7765faa2621bbd98e10507e7a2c6c834c566d49eabe787f8f1ca95e7e22334aefc