Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
0d5baa5aaef8b9b5f6a4966259e09c61.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0d5baa5aaef8b9b5f6a4966259e09c61.exe
Resource
win10v2004-20231215-en
General
-
Target
0d5baa5aaef8b9b5f6a4966259e09c61.exe
-
Size
771KB
-
MD5
0d5baa5aaef8b9b5f6a4966259e09c61
-
SHA1
a2fce8c9cc501d9e72a93cf3120b09d63b2cd283
-
SHA256
91b92bb49482dc30e2e6c11d67f4383c04ca223b281ae36d6cbe9c29b423c055
-
SHA512
b418c4ff8cefda463899c595fb42818cf977d9c7ed082fc43a0d654902c6d3718883887c8c4f5bc82c597ab29e1f78cf4ad483cde3528bbc8261c774289c6410
-
SSDEEP
24576:hg9FMRwCEXZlzwiutIq0r6uveb10hJaothZ2/T6FBBB:hgwafz1utIq0fvI/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 536 0d5baa5aaef8b9b5f6a4966259e09c61.exe -
Executes dropped EXE 1 IoCs
pid Process 536 0d5baa5aaef8b9b5f6a4966259e09c61.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3156 0d5baa5aaef8b9b5f6a4966259e09c61.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3156 0d5baa5aaef8b9b5f6a4966259e09c61.exe 536 0d5baa5aaef8b9b5f6a4966259e09c61.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3156 wrote to memory of 536 3156 0d5baa5aaef8b9b5f6a4966259e09c61.exe 89 PID 3156 wrote to memory of 536 3156 0d5baa5aaef8b9b5f6a4966259e09c61.exe 89 PID 3156 wrote to memory of 536 3156 0d5baa5aaef8b9b5f6a4966259e09c61.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d5baa5aaef8b9b5f6a4966259e09c61.exe"C:\Users\Admin\AppData\Local\Temp\0d5baa5aaef8b9b5f6a4966259e09c61.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\0d5baa5aaef8b9b5f6a4966259e09c61.exeC:\Users\Admin\AppData\Local\Temp\0d5baa5aaef8b9b5f6a4966259e09c61.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD539567468c598f37bf319d610f702faa9
SHA17761ebfb391cd17bd1149a74c9eff21a1f8f8b32
SHA2563dbff2018e7fec6356e7f2c5e9792cfda45401ac1c9b557cf92595b01e1dc7ed
SHA5120526f5cbf5ce2d35f86d596008027e4465277164e4b5f8c9fb9b124d17c1e65e8b70e5874f5e5dc9993107f65df8c17780d217e27108b776380c4e9d7b96d97e