Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
38a6dd15d47d0ae89cec6f94532f6b66.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38a6dd15d47d0ae89cec6f94532f6b66.exe
Resource
win10v2004-20231215-en
General
-
Target
38a6dd15d47d0ae89cec6f94532f6b66.exe
-
Size
385KB
-
MD5
38a6dd15d47d0ae89cec6f94532f6b66
-
SHA1
b28e23b77d779cc8499e3a3202cf78743feafbb0
-
SHA256
4d07568f569f5f59172c62a935515931c8eea51984ad2a4c6899aff877d856a2
-
SHA512
9959646edbc3cf067e5de8451bff4b1d55c03bce92b4a639334c1133d71bc5bf5a9db618c0e94eaa9182ba0ef32f8ff542bf54ba693ef04d5645966b19b39fb1
-
SSDEEP
12288:Ru75D7J+Kqjmc7OScWMXzn+8Um0HQOkFvPfB:Odt+bmxrn1Um+ZkBXB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4636 38a6dd15d47d0ae89cec6f94532f6b66.exe -
Executes dropped EXE 1 IoCs
pid Process 4636 38a6dd15d47d0ae89cec6f94532f6b66.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4944 38a6dd15d47d0ae89cec6f94532f6b66.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4944 38a6dd15d47d0ae89cec6f94532f6b66.exe 4636 38a6dd15d47d0ae89cec6f94532f6b66.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4944 wrote to memory of 4636 4944 38a6dd15d47d0ae89cec6f94532f6b66.exe 50 PID 4944 wrote to memory of 4636 4944 38a6dd15d47d0ae89cec6f94532f6b66.exe 50 PID 4944 wrote to memory of 4636 4944 38a6dd15d47d0ae89cec6f94532f6b66.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\38a6dd15d47d0ae89cec6f94532f6b66.exe"C:\Users\Admin\AppData\Local\Temp\38a6dd15d47d0ae89cec6f94532f6b66.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\38a6dd15d47d0ae89cec6f94532f6b66.exeC:\Users\Admin\AppData\Local\Temp\38a6dd15d47d0ae89cec6f94532f6b66.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD50e51aef072ae184d8b58a0fd06ec8574
SHA175230d8ae94453a0ffd07dcd39d7d9b400c1ae94
SHA256b9de05044a9a475108084d3d77df2d3bf6e97784e424ec3f5caeb443804819fe
SHA51264bfa928d7342f491fb89b45ffd3b7738a2c9a66fcd208c3f96e6eb614b8657afdcbe977b7fd38c1a67d71059081c7c3cab655b05ae5f52009a0eb367e792430