Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
262c3a17249cf285ff0ecbbe1f016f63.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
262c3a17249cf285ff0ecbbe1f016f63.exe
Resource
win10v2004-20231215-en
General
-
Target
262c3a17249cf285ff0ecbbe1f016f63.exe
-
Size
907KB
-
MD5
262c3a17249cf285ff0ecbbe1f016f63
-
SHA1
a6f28c716816bb68574f0f4ada377ff9ea93be38
-
SHA256
6b2cdbb6b711d4b2dd358a43184b813356d636f697b75839b728293dcbb043a4
-
SHA512
f8ff348188fb812bedd2addd99a1ffccb4f20cfa9d9041cbf0fd7283ecc789597b4f39b1cdb22a806154c0e59c9cf898486761f6642fc059d5f627f03d04b50b
-
SSDEEP
24576:k77J6dQP2ky8B5vZwQPt/mO6B1DKZa/ZS1:WR2ky8zZwQ1/vgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4592 262c3a17249cf285ff0ecbbe1f016f63.exe -
Executes dropped EXE 1 IoCs
pid Process 4592 262c3a17249cf285ff0ecbbe1f016f63.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 492 262c3a17249cf285ff0ecbbe1f016f63.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 492 262c3a17249cf285ff0ecbbe1f016f63.exe 4592 262c3a17249cf285ff0ecbbe1f016f63.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 492 wrote to memory of 4592 492 262c3a17249cf285ff0ecbbe1f016f63.exe 91 PID 492 wrote to memory of 4592 492 262c3a17249cf285ff0ecbbe1f016f63.exe 91 PID 492 wrote to memory of 4592 492 262c3a17249cf285ff0ecbbe1f016f63.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\262c3a17249cf285ff0ecbbe1f016f63.exe"C:\Users\Admin\AppData\Local\Temp\262c3a17249cf285ff0ecbbe1f016f63.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Users\Admin\AppData\Local\Temp\262c3a17249cf285ff0ecbbe1f016f63.exeC:\Users\Admin\AppData\Local\Temp\262c3a17249cf285ff0ecbbe1f016f63.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386KB
MD5e8e0f513a384163c90c196fce2574f59
SHA10f71747b68ce1d022bd12b3a255e28bbc218b6bb
SHA2561576fc76979a653b44801c98fb073837bc3a172c5d8e8f319dbd9018467eac50
SHA512691ddde8ffbebfd5e7d1df0f8529c27c2f20557fe767f2401c62ef50af449523feaf637b9a67f7975b268006d6fceb104a30b5c342f23915b37a67cbeab825dd