Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
0970f0b9276d9192d9c8b166ba574fb6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0970f0b9276d9192d9c8b166ba574fb6.exe
Resource
win10v2004-20231215-en
General
-
Target
0970f0b9276d9192d9c8b166ba574fb6.exe
-
Size
771KB
-
MD5
0970f0b9276d9192d9c8b166ba574fb6
-
SHA1
c3136ac4f8959d10920d9a30a3cb7d0a5a4c9ac9
-
SHA256
54297d59ed4cd61f68f6efe987d14bf8e3993eb98c6a459d96c34b2f6b038661
-
SHA512
32979e2b8fe242edf910ccf566502e989fd1d24c885c9064aee3a1dc4d877fcaa0c6035a342eea35384416458ac3d4517f83eddbbcf09a97c711ac14ae7a382d
-
SSDEEP
12288:F80L6E3gfcu7t7An54NwPk3U7jymb10VHmDXTuFaa2AtyGTKOF25ZoJJyhRge8B/:FL3O7t7Anxbjjb10hJaothZ2/T6FBBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4064 0970f0b9276d9192d9c8b166ba574fb6.exe -
Executes dropped EXE 1 IoCs
pid Process 4064 0970f0b9276d9192d9c8b166ba574fb6.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4440 0970f0b9276d9192d9c8b166ba574fb6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4440 0970f0b9276d9192d9c8b166ba574fb6.exe 4064 0970f0b9276d9192d9c8b166ba574fb6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4440 wrote to memory of 4064 4440 0970f0b9276d9192d9c8b166ba574fb6.exe 18 PID 4440 wrote to memory of 4064 4440 0970f0b9276d9192d9c8b166ba574fb6.exe 18 PID 4440 wrote to memory of 4064 4440 0970f0b9276d9192d9c8b166ba574fb6.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\0970f0b9276d9192d9c8b166ba574fb6.exe"C:\Users\Admin\AppData\Local\Temp\0970f0b9276d9192d9c8b166ba574fb6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\0970f0b9276d9192d9c8b166ba574fb6.exeC:\Users\Admin\AppData\Local\Temp\0970f0b9276d9192d9c8b166ba574fb6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD58a2defc27eb17498e33cfc6a45831077
SHA191f6e5c0e24e530a618b5e3592ef20612bfd75b1
SHA2568f4cafbf3d09fa11bd20ee99368cd18d1a79a6fb93ad3b6444258372fa24bf88
SHA5127eaf011d78721c9619792cbe6492fdc3e06fa708c2bd05192ce9221a1d5642df34443559d72f1848bae52261f6df71f341d83e6660778e3bc24df3b6ea120f95