Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
170s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
3a7aafe0e9cbfa09c3211ff7b06405ef.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a7aafe0e9cbfa09c3211ff7b06405ef.exe
Resource
win10v2004-20231215-en
General
-
Target
3a7aafe0e9cbfa09c3211ff7b06405ef.exe
-
Size
385KB
-
MD5
3a7aafe0e9cbfa09c3211ff7b06405ef
-
SHA1
d9cec44a916d00a64ce602d741135d01a8e2f4d8
-
SHA256
bf222b2e09c30c9d0b34241f11a495de50192ff7bb6a4f4249f132c8880b02ed
-
SHA512
511c20c8eecbb1891f0cfbe8ffc9b46c46f450b38c5c6a6b3abf34dc66e066385f4047c04b5087e6419d3265f75eba89ba0555816f420f6286c2b52a28825d25
-
SSDEEP
6144:cmr7GN+Ws5eclzJeU1jNbrf7rPFXwhDfcunCGvZoDFztx3GX9jGB:cmXGI5tnbrPPFcp8DhtNo9aB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 212 3a7aafe0e9cbfa09c3211ff7b06405ef.exe -
Executes dropped EXE 1 IoCs
pid Process 212 3a7aafe0e9cbfa09c3211ff7b06405ef.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1932 3a7aafe0e9cbfa09c3211ff7b06405ef.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1932 3a7aafe0e9cbfa09c3211ff7b06405ef.exe 212 3a7aafe0e9cbfa09c3211ff7b06405ef.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1932 wrote to memory of 212 1932 3a7aafe0e9cbfa09c3211ff7b06405ef.exe 92 PID 1932 wrote to memory of 212 1932 3a7aafe0e9cbfa09c3211ff7b06405ef.exe 92 PID 1932 wrote to memory of 212 1932 3a7aafe0e9cbfa09c3211ff7b06405ef.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a7aafe0e9cbfa09c3211ff7b06405ef.exe"C:\Users\Admin\AppData\Local\Temp\3a7aafe0e9cbfa09c3211ff7b06405ef.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\3a7aafe0e9cbfa09c3211ff7b06405ef.exeC:\Users\Admin\AppData\Local\Temp\3a7aafe0e9cbfa09c3211ff7b06405ef.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD505681507a50e0aef3d96b7ba4ed9dc8d
SHA1a4204ed7bc142136278913aaeeda7c6e853da00d
SHA2564399158b05f3160c650301c678bb803a1acdc210dd4fdecd2a1888bfdb9d94da
SHA51212e029705784a69b50c1626d35244d7c4ddb475a98664f5c440074f592960f21d9f3694affcfb98d08af21eec27ac1f802e83acfce949d36e094d4734dfc541e