Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
3cc66a165339d6cb06aedf7ef01bfb53.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3cc66a165339d6cb06aedf7ef01bfb53.exe
Resource
win10v2004-20231215-en
General
-
Target
3cc66a165339d6cb06aedf7ef01bfb53.exe
-
Size
385KB
-
MD5
3cc66a165339d6cb06aedf7ef01bfb53
-
SHA1
afa3f1955e8f0a14572b25000aebe827668a277a
-
SHA256
ee373aa55977eba7a3aa2da6c01d0dfb9fe2d75d7d12cc0a447b0da62ed86968
-
SHA512
d156484ffac15c4080c86ed83740bbe24be1e7ec96007715dcd9a9fc7be62416e85a8b55be925b249a6404a85044193be9915fabce7a40283fdad35c68e2cfc5
-
SSDEEP
12288:Prs6BVsHnpSQmNlGiOKNjlTh63/v44X1T/oNNB:Prs6B2cQqldRjlt444FT/sNB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2372 3cc66a165339d6cb06aedf7ef01bfb53.exe -
Executes dropped EXE 1 IoCs
pid Process 2372 3cc66a165339d6cb06aedf7ef01bfb53.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1608 3cc66a165339d6cb06aedf7ef01bfb53.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1608 3cc66a165339d6cb06aedf7ef01bfb53.exe 2372 3cc66a165339d6cb06aedf7ef01bfb53.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1608 wrote to memory of 2372 1608 3cc66a165339d6cb06aedf7ef01bfb53.exe 14 PID 1608 wrote to memory of 2372 1608 3cc66a165339d6cb06aedf7ef01bfb53.exe 14 PID 1608 wrote to memory of 2372 1608 3cc66a165339d6cb06aedf7ef01bfb53.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cc66a165339d6cb06aedf7ef01bfb53.exeC:\Users\Admin\AppData\Local\Temp\3cc66a165339d6cb06aedf7ef01bfb53.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2372
-
C:\Users\Admin\AppData\Local\Temp\3cc66a165339d6cb06aedf7ef01bfb53.exe"C:\Users\Admin\AppData\Local\Temp\3cc66a165339d6cb06aedf7ef01bfb53.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD598f05f79fc369d7906baca2866ad1095
SHA1bd1de2a0ff3d1e80d9ff310d90a8af8f70fd20fd
SHA2564bb1757ea22aadcc40831298131be02c1035b39d3cd8c3ce195830f1df0f540e
SHA5127b867853c0e6b7949726badb53c46937530d64d692b7621c8ae20cdcfff07299a0490945f750d91870dfe808b81e3054f90ad38ce15161dee28c98b7bb1fe66d