Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
180s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
247b2c1b9fbba0979f60eebfd523cd30.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
247b2c1b9fbba0979f60eebfd523cd30.exe
Resource
win10v2004-20231215-en
General
-
Target
247b2c1b9fbba0979f60eebfd523cd30.exe
-
Size
907KB
-
MD5
247b2c1b9fbba0979f60eebfd523cd30
-
SHA1
090bc7ec17693ac1daf57617aa4bf73381757446
-
SHA256
2f6d0c2ee294b65e05374e0c61b6235e8d1b80b1e77e147b223191f763d0fbdc
-
SHA512
a7a820dd49e2be8154371bd1f9502d6b4606b5cdcdb61edc0786f37427ae056e73b3ee55a46680b6e9c12ee804f45e19b8b5b8f4d80386e5c24355ca587cd6a1
-
SSDEEP
24576:ZloFJ0S6dLA1+sifYvZBHsdkg8FbSa/ZS1:LoFJILAdk0jgCSgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 964 247b2c1b9fbba0979f60eebfd523cd30.exe -
Executes dropped EXE 1 IoCs
pid Process 964 247b2c1b9fbba0979f60eebfd523cd30.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1800 247b2c1b9fbba0979f60eebfd523cd30.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1800 247b2c1b9fbba0979f60eebfd523cd30.exe 964 247b2c1b9fbba0979f60eebfd523cd30.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1800 wrote to memory of 964 1800 247b2c1b9fbba0979f60eebfd523cd30.exe 92 PID 1800 wrote to memory of 964 1800 247b2c1b9fbba0979f60eebfd523cd30.exe 92 PID 1800 wrote to memory of 964 1800 247b2c1b9fbba0979f60eebfd523cd30.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\247b2c1b9fbba0979f60eebfd523cd30.exe"C:\Users\Admin\AppData\Local\Temp\247b2c1b9fbba0979f60eebfd523cd30.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\247b2c1b9fbba0979f60eebfd523cd30.exeC:\Users\Admin\AppData\Local\Temp\247b2c1b9fbba0979f60eebfd523cd30.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
452KB
MD55067c146435b711da579fc49afd9f338
SHA14431a15b986c4fbccf01476ed916c4ed279e799d
SHA256215e50b7a1d5efc177a6dd5aa469b10b6d13cedaaef3c822863ed0b71f75f8b5
SHA51222064a01d3b3aeb4933dd06b0fcc7d89f806b01c4e844213f28c892e8f426ac62a05cdccde49855f3cf4877cca3882fabba10259c2beaad5d165f642fb792ace