Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 13:49

General

  • Target

    38a6dd15d47d0ae89cec6f94532f6b66.exe

  • Size

    385KB

  • MD5

    38a6dd15d47d0ae89cec6f94532f6b66

  • SHA1

    b28e23b77d779cc8499e3a3202cf78743feafbb0

  • SHA256

    4d07568f569f5f59172c62a935515931c8eea51984ad2a4c6899aff877d856a2

  • SHA512

    9959646edbc3cf067e5de8451bff4b1d55c03bce92b4a639334c1133d71bc5bf5a9db618c0e94eaa9182ba0ef32f8ff542bf54ba693ef04d5645966b19b39fb1

  • SSDEEP

    12288:Ru75D7J+Kqjmc7OScWMXzn+8Um0HQOkFvPfB:Odt+bmxrn1Um+ZkBXB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38a6dd15d47d0ae89cec6f94532f6b66.exe
    "C:\Users\Admin\AppData\Local\Temp\38a6dd15d47d0ae89cec6f94532f6b66.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4944
    • C:\Users\Admin\AppData\Local\Temp\38a6dd15d47d0ae89cec6f94532f6b66.exe
      C:\Users\Admin\AppData\Local\Temp\38a6dd15d47d0ae89cec6f94532f6b66.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\38a6dd15d47d0ae89cec6f94532f6b66.exe

    Filesize

    18KB

    MD5

    0e51aef072ae184d8b58a0fd06ec8574

    SHA1

    75230d8ae94453a0ffd07dcd39d7d9b400c1ae94

    SHA256

    b9de05044a9a475108084d3d77df2d3bf6e97784e424ec3f5caeb443804819fe

    SHA512

    64bfa928d7342f491fb89b45ffd3b7738a2c9a66fcd208c3f96e6eb614b8657afdcbe977b7fd38c1a67d71059081c7c3cab655b05ae5f52009a0eb367e792430

  • memory/4636-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4636-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/4636-20-0x00000000017C0000-0x000000000181F000-memory.dmp

    Filesize

    380KB

  • memory/4636-14-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/4636-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4636-36-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4636-35-0x000000000B600000-0x000000000B63C000-memory.dmp

    Filesize

    240KB

  • memory/4944-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4944-1-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/4944-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4944-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB