Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
194s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
0bce4b35f0b33f6b0bb713ef475a6a06.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0bce4b35f0b33f6b0bb713ef475a6a06.exe
Resource
win10v2004-20231215-en
General
-
Target
0bce4b35f0b33f6b0bb713ef475a6a06.exe
-
Size
385KB
-
MD5
0bce4b35f0b33f6b0bb713ef475a6a06
-
SHA1
d933ffb90697089f4e436754b38ff93aa8bf72c1
-
SHA256
4757c9dcd230a95051a102ec791624c2c78132edcf2c4f5551380e5f69d79d6d
-
SHA512
7b0164f43c20b59577a5feb23690826d7168956fab7ee08c96933b45977138e10dd18c37e0344eb068dd9559f33cef2e62a716a85436bc7ec2757d8fe01ffdd8
-
SSDEEP
6144:fT4+umOMZ/m/cKSCv03/TIHrtVhEzW79aDhkEugbsiFLZKJv/C0K0SdjhpmCyiB:fgmVZe0K5vptszW79aljFNKJS0chVB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4300 0bce4b35f0b33f6b0bb713ef475a6a06.exe -
Executes dropped EXE 1 IoCs
pid Process 4300 0bce4b35f0b33f6b0bb713ef475a6a06.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2116 0bce4b35f0b33f6b0bb713ef475a6a06.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2116 0bce4b35f0b33f6b0bb713ef475a6a06.exe 4300 0bce4b35f0b33f6b0bb713ef475a6a06.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2116 wrote to memory of 4300 2116 0bce4b35f0b33f6b0bb713ef475a6a06.exe 86 PID 2116 wrote to memory of 4300 2116 0bce4b35f0b33f6b0bb713ef475a6a06.exe 86 PID 2116 wrote to memory of 4300 2116 0bce4b35f0b33f6b0bb713ef475a6a06.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bce4b35f0b33f6b0bb713ef475a6a06.exe"C:\Users\Admin\AppData\Local\Temp\0bce4b35f0b33f6b0bb713ef475a6a06.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\0bce4b35f0b33f6b0bb713ef475a6a06.exeC:\Users\Admin\AppData\Local\Temp\0bce4b35f0b33f6b0bb713ef475a6a06.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e8ded5fa104e196cee7facdebfd5ade9
SHA1e93f3427b09cd6c67b7250cc3c9b34fe4537affe
SHA2560dccdc5e93a2b7fc01001dff2b6d6a6b9aa5234f854ae4ff0b2d4000459e836b
SHA512ffd7f2f528b3e412831c4ecfacd11e209447d68de80e3501fe89a8d21b720b755f980b2adaf83d058e47c9300085754e324f99cf2151a30c44893dfe2af81cab