Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
209s -
max time network
222s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
11b0bf6731b2d4a8b2a433fb028f48e5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
11b0bf6731b2d4a8b2a433fb028f48e5.exe
Resource
win10v2004-20231215-en
General
-
Target
11b0bf6731b2d4a8b2a433fb028f48e5.exe
-
Size
385KB
-
MD5
11b0bf6731b2d4a8b2a433fb028f48e5
-
SHA1
889bb733773142c711d447569c0b1947aae15069
-
SHA256
014e86f83200895728bff7b86d5eec1cec82003ac8c8fdede1f9db78d7be8585
-
SHA512
cb41710c1cfc85124b1ceb4a0ab1c33fceb5fb39c5ba80ce9461aab6cd6c32bd7adc2dbc9db9a1cce0627593ea41edba0e855cee21f7d1e467a098154727a975
-
SSDEEP
12288:2605Rc7LYWu/upkzFQnXX88xsg7UaMn8rJRUynEMSg4N/dO7tHB:705RgLYtSSQXJswlB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3000 11b0bf6731b2d4a8b2a433fb028f48e5.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 11b0bf6731b2d4a8b2a433fb028f48e5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4364 11b0bf6731b2d4a8b2a433fb028f48e5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4364 11b0bf6731b2d4a8b2a433fb028f48e5.exe 3000 11b0bf6731b2d4a8b2a433fb028f48e5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4364 wrote to memory of 3000 4364 11b0bf6731b2d4a8b2a433fb028f48e5.exe 91 PID 4364 wrote to memory of 3000 4364 11b0bf6731b2d4a8b2a433fb028f48e5.exe 91 PID 4364 wrote to memory of 3000 4364 11b0bf6731b2d4a8b2a433fb028f48e5.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\11b0bf6731b2d4a8b2a433fb028f48e5.exe"C:\Users\Admin\AppData\Local\Temp\11b0bf6731b2d4a8b2a433fb028f48e5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\11b0bf6731b2d4a8b2a433fb028f48e5.exeC:\Users\Admin\AppData\Local\Temp\11b0bf6731b2d4a8b2a433fb028f48e5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD546dcd9f0d5861d803cd2bf8a04efc9b2
SHA11ae3874e31d372d4a04ba7d80974ecbbebe4e887
SHA256a05fb9cb277c62c17d9ef104893bdea2672f22da741a93482b6ce26627d53676
SHA512f083c692080897b6e5c590568ba40d834c1212a2513894d20a6dd1fa53a94e68ec2ebc218d3b4062b9aec82f67459320f6fe19433078baf99f1d817660c96640