Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:29
Static task
static1
Behavioral task
behavioral1
Sample
282fc51cdfbb2d609fdc67b3394dec9b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
282fc51cdfbb2d609fdc67b3394dec9b.exe
Resource
win10v2004-20231215-en
General
-
Target
282fc51cdfbb2d609fdc67b3394dec9b.exe
-
Size
385KB
-
MD5
282fc51cdfbb2d609fdc67b3394dec9b
-
SHA1
d9677f445a22889efcc4fbc9f3eefafae02eea4a
-
SHA256
1b479d2d4a0e029b91c2364eb55d0b24f7a518b232efd976bfb00964de8c2f5d
-
SHA512
3f469cc92d941f67d22cb2b852868bf7cebfb0022a7fad7b3300c336b0ee3f3ce93bdb276c837269208a18be1bee8fb81546dfdfaab33b4648aae94f27315e41
-
SSDEEP
6144:Nh4hjjqm+HC4RiAYRtPhvkqpKGZ/0P67cM+XGqjp//WIX4XMzAI+3sB:H4hCm6C4Rc5vkU3Zu9Lp/DXIMzAI+3sB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2020 282fc51cdfbb2d609fdc67b3394dec9b.exe -
Executes dropped EXE 1 IoCs
pid Process 2020 282fc51cdfbb2d609fdc67b3394dec9b.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3308 282fc51cdfbb2d609fdc67b3394dec9b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3308 282fc51cdfbb2d609fdc67b3394dec9b.exe 2020 282fc51cdfbb2d609fdc67b3394dec9b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3308 wrote to memory of 2020 3308 282fc51cdfbb2d609fdc67b3394dec9b.exe 20 PID 3308 wrote to memory of 2020 3308 282fc51cdfbb2d609fdc67b3394dec9b.exe 20 PID 3308 wrote to memory of 2020 3308 282fc51cdfbb2d609fdc67b3394dec9b.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\282fc51cdfbb2d609fdc67b3394dec9b.exe"C:\Users\Admin\AppData\Local\Temp\282fc51cdfbb2d609fdc67b3394dec9b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\282fc51cdfbb2d609fdc67b3394dec9b.exeC:\Users\Admin\AppData\Local\Temp\282fc51cdfbb2d609fdc67b3394dec9b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5ad893705156c15f3203ac4a7514cdc83
SHA109551a4799fc097d55c2dd1cdd69ac21e320a886
SHA256452979ee19eabe465b2f366d931e0416b17f94f0dac9ebde56de664f98f32179
SHA512e33c9cec7c064e3bc5371a2e7122c772dc7c41e6cb55e2a328332235c05a27f93fb0f1238beed0ad32aeb09e5b161f86c439dbddff59695f5e0a62f676ebc67c