Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0eb66305c6562bd859e13bd69caf0430.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
0eb66305c6562bd859e13bd69caf0430.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
0eb66305c6562bd859e13bd69caf0430.exe
-
Size
385KB
-
MD5
0eb66305c6562bd859e13bd69caf0430
-
SHA1
980bdabc83e176e43ce327d1557a658ce995635c
-
SHA256
2f6265aa82894b2e813a6a901d7fb3353756daa14ef6ebc0d099a1dea408783c
-
SHA512
521ebde06b97d0174254b3ee63437fa51e7a483e6a7fe59e17ad15b7939033bcdb6e9c06b9f5ea5a07307f3ca12f4e7f775b1c9457f8880344c60dbb31b7b164
-
SSDEEP
12288:slwz4fo1A93oL1B7QIbV+c/EJ+qZV1eL/bNB:sleTm9QQeue1B
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4544 0eb66305c6562bd859e13bd69caf0430.exe -
Executes dropped EXE 1 IoCs
pid Process 4544 0eb66305c6562bd859e13bd69caf0430.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4952 0eb66305c6562bd859e13bd69caf0430.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4952 0eb66305c6562bd859e13bd69caf0430.exe 4544 0eb66305c6562bd859e13bd69caf0430.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4952 wrote to memory of 4544 4952 0eb66305c6562bd859e13bd69caf0430.exe 17 PID 4952 wrote to memory of 4544 4952 0eb66305c6562bd859e13bd69caf0430.exe 17 PID 4952 wrote to memory of 4544 4952 0eb66305c6562bd859e13bd69caf0430.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eb66305c6562bd859e13bd69caf0430.exe"C:\Users\Admin\AppData\Local\Temp\0eb66305c6562bd859e13bd69caf0430.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\0eb66305c6562bd859e13bd69caf0430.exeC:\Users\Admin\AppData\Local\Temp\0eb66305c6562bd859e13bd69caf0430.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4544
-