Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
1894e7928fed40d64aae9757f4122d98.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1894e7928fed40d64aae9757f4122d98.exe
Resource
win10v2004-20231222-en
General
-
Target
1894e7928fed40d64aae9757f4122d98.exe
-
Size
771KB
-
MD5
1894e7928fed40d64aae9757f4122d98
-
SHA1
8e9da1e1b4fdb0b375f3fc75dc26c14dcb3dab55
-
SHA256
37f9c17e7cc56514aeeab9e1ff19d32a4bb45f2fdbf6a94a3d5d3fe6f409a984
-
SHA512
c32834aa29f131f4f50cfb2e9d8b1b5f42ac246c07c548072260fe544799863d07d4b03aa53413451a851736edf8ef5474c2f3cc67c7209a10b41e718a8fb528
-
SSDEEP
12288:54JkBCKJYlak6KJV1tGKXxUZISGlb10VHmDXTuFaa2AtyGTKOF25ZoJJyhRge8B/:5DOPT7MITlb10hJaothZ2/T6FBBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1040 1894e7928fed40d64aae9757f4122d98.exe -
Executes dropped EXE 1 IoCs
pid Process 1040 1894e7928fed40d64aae9757f4122d98.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1496 1894e7928fed40d64aae9757f4122d98.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1496 1894e7928fed40d64aae9757f4122d98.exe 1040 1894e7928fed40d64aae9757f4122d98.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1496 wrote to memory of 1040 1496 1894e7928fed40d64aae9757f4122d98.exe 89 PID 1496 wrote to memory of 1040 1496 1894e7928fed40d64aae9757f4122d98.exe 89 PID 1496 wrote to memory of 1040 1496 1894e7928fed40d64aae9757f4122d98.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1894e7928fed40d64aae9757f4122d98.exe"C:\Users\Admin\AppData\Local\Temp\1894e7928fed40d64aae9757f4122d98.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\1894e7928fed40d64aae9757f4122d98.exeC:\Users\Admin\AppData\Local\Temp\1894e7928fed40d64aae9757f4122d98.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD5dc2fffa8cf73b1add781339a7779c142
SHA14191c47b9737734d728896271dc7c8859c582408
SHA256fbf390f143a4d0dc2c580a09956a4765e1e4589b9d25c32f46087d23a5b13d96
SHA51213d7b369ec6496ee87e9b25656df2bd016781ad8bab5c2ecf86f0a5a1a95131610e6400846314ebd434a9a30f82b2242db8287c4105f9e11cf98de13aa01f5e6