Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
2547006aab15893bc04e6d8eecaeb3ee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2547006aab15893bc04e6d8eecaeb3ee.exe
Resource
win10v2004-20231215-en
General
-
Target
2547006aab15893bc04e6d8eecaeb3ee.exe
-
Size
385KB
-
MD5
2547006aab15893bc04e6d8eecaeb3ee
-
SHA1
95b9e7682971c6923912cea12dc0e1738f2842db
-
SHA256
cbc9840fbbfb0a6908e8ec80033f53e1afd1a8e0c39af393d7d94daede66591e
-
SHA512
4987b3accc5718f3df666b1a5683e7e451f4110986eee751f5422bd19491843294258410817e949036c052366bff54656ba2f634f8f6fa508e7455fa4c766238
-
SSDEEP
12288:XsljbapSrmS61S5daKZxQxb4bzDyzDOO2uB:clZm3oZPIDBLB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2252 2547006aab15893bc04e6d8eecaeb3ee.exe -
Executes dropped EXE 1 IoCs
pid Process 2252 2547006aab15893bc04e6d8eecaeb3ee.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2344 2547006aab15893bc04e6d8eecaeb3ee.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2344 2547006aab15893bc04e6d8eecaeb3ee.exe 2252 2547006aab15893bc04e6d8eecaeb3ee.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2252 2344 2547006aab15893bc04e6d8eecaeb3ee.exe 93 PID 2344 wrote to memory of 2252 2344 2547006aab15893bc04e6d8eecaeb3ee.exe 93 PID 2344 wrote to memory of 2252 2344 2547006aab15893bc04e6d8eecaeb3ee.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2547006aab15893bc04e6d8eecaeb3ee.exe"C:\Users\Admin\AppData\Local\Temp\2547006aab15893bc04e6d8eecaeb3ee.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\2547006aab15893bc04e6d8eecaeb3ee.exeC:\Users\Admin\AppData\Local\Temp\2547006aab15893bc04e6d8eecaeb3ee.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5929d312723c7f4125686d2ecafed2cf6
SHA1d87fcd421c0c8297daa08a2d660416aedae53a25
SHA2564cec61a168dd40350ece1167d4378a493bca8d12461268b0e833c9f82c25c927
SHA5122556a53141b36a4195bdb0cb999a7a21d6fe986f396f6ed09bd7a8c34ab3a980b4f7853e3eaf94330171c39d615f2ea1571b4b607de50ec85d953672e746ba0c