Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
24870c14264981ec63d5c7476f540645.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
24870c14264981ec63d5c7476f540645.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
24870c14264981ec63d5c7476f540645.exe
-
Size
385KB
-
MD5
24870c14264981ec63d5c7476f540645
-
SHA1
8aaab24f848efaba575da49083eef9573997660b
-
SHA256
97f30081c4a1e0a879e7296e8ed023b74df444a59bcea4f890af9691c1a57f05
-
SHA512
72f340a1142968de7d69bf8984e00d87a8fc4cc951c0bcf8db021584a20d07e233cb1b8012bc8c1efc93ed36be90499b62e73bc5e27881761e461a5d79311746
-
SSDEEP
12288:Z0XGaRSmyBaKNmAfi8Eqfp16utmZaTd9bsG9ctAlB03xHNycsuB:Yz3azfljmZaTd9bsG9ctAlB03xHNycs0
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2992 24870c14264981ec63d5c7476f540645.exe -
Executes dropped EXE 1 IoCs
pid Process 2992 24870c14264981ec63d5c7476f540645.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3508 24870c14264981ec63d5c7476f540645.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3508 24870c14264981ec63d5c7476f540645.exe 2992 24870c14264981ec63d5c7476f540645.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3508 wrote to memory of 2992 3508 24870c14264981ec63d5c7476f540645.exe 15 PID 3508 wrote to memory of 2992 3508 24870c14264981ec63d5c7476f540645.exe 15 PID 3508 wrote to memory of 2992 3508 24870c14264981ec63d5c7476f540645.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\24870c14264981ec63d5c7476f540645.exe"C:\Users\Admin\AppData\Local\Temp\24870c14264981ec63d5c7476f540645.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\24870c14264981ec63d5c7476f540645.exeC:\Users\Admin\AppData\Local\Temp\24870c14264981ec63d5c7476f540645.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2992
-