Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
1ed12837053c8fa8505dac71a07bfc19.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ed12837053c8fa8505dac71a07bfc19.exe
Resource
win10v2004-20231215-en
General
-
Target
1ed12837053c8fa8505dac71a07bfc19.exe
-
Size
385KB
-
MD5
1ed12837053c8fa8505dac71a07bfc19
-
SHA1
c511f743e79cb956185d975b5d105c6576147f1f
-
SHA256
3f702b6097ea8339b411e68e518deebdd89b995d946550938ffe3a15faa1dded
-
SHA512
cc99c3891647d386ead5b0f9ac285c3facc53fda1eb0cd472d71fac6b9bf07e901baa0d9ae6b9142bc2550fbd3df6e9dba7c6354e1aab9f585e2ba58cee92f49
-
SSDEEP
6144:M6JcGguTp9quzkxGnFxXEHlx/MGnmOLWDOBU7lLqVUcVTGhXiaykYVLfLqhIrXJz:jcGr3Qlx/MGZzBUpuGcluiHga1B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1896 1ed12837053c8fa8505dac71a07bfc19.exe -
Executes dropped EXE 1 IoCs
pid Process 1896 1ed12837053c8fa8505dac71a07bfc19.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1836 1ed12837053c8fa8505dac71a07bfc19.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1836 1ed12837053c8fa8505dac71a07bfc19.exe 1896 1ed12837053c8fa8505dac71a07bfc19.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1896 1836 1ed12837053c8fa8505dac71a07bfc19.exe 87 PID 1836 wrote to memory of 1896 1836 1ed12837053c8fa8505dac71a07bfc19.exe 87 PID 1836 wrote to memory of 1896 1836 1ed12837053c8fa8505dac71a07bfc19.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ed12837053c8fa8505dac71a07bfc19.exe"C:\Users\Admin\AppData\Local\Temp\1ed12837053c8fa8505dac71a07bfc19.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\1ed12837053c8fa8505dac71a07bfc19.exeC:\Users\Admin\AppData\Local\Temp\1ed12837053c8fa8505dac71a07bfc19.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305KB
MD53d55a1eb026a4c09c66383816497fd6e
SHA15a3dbb68bbd1918af6a4d2e8886e1dcbfd3117ff
SHA25666f94aa5480d6ac750904e98dfd8f2788a057df1fb6c068a8da8e84fa6a84146
SHA512559a5b09afd84ec239a3fa624f3e2801b62f9ecb57ad78042e3d4588176e61ebdb9c59c654ce8966f2d2aff2e32c78f64514dac3597d6ea44a299fcc20481bc3