Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
3e3e6f1a8eb7047c6720d62d44bef3d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e3e6f1a8eb7047c6720d62d44bef3d4.exe
Resource
win10v2004-20231215-en
General
-
Target
3e3e6f1a8eb7047c6720d62d44bef3d4.exe
-
Size
771KB
-
MD5
3e3e6f1a8eb7047c6720d62d44bef3d4
-
SHA1
34c437ccc010bc3d328b975d1d87c5e51a0e1604
-
SHA256
4d9b99f796cd727d5a77ebc3de34faa28ab7b34210b9f2ce1c2152b1c5c497ae
-
SHA512
b3e69f8ab61eafa21265e0d971b2e5176b229f53c46f66e65f9f42f98ba84421025b8e4c87dc59e4baf44b1635f8f27c20dea8f7f59e6bd1c9aa428c2b775fa6
-
SSDEEP
12288:Zpf8VCnARUOkzWHRBvg23tFb10VHmDXTuFaa2AtyGTKOF25ZoJJyhRge8BpH9PVB:Zd8owlEWHRB4crb10hJaothZ2/T6FBBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3336 3e3e6f1a8eb7047c6720d62d44bef3d4.exe -
Executes dropped EXE 1 IoCs
pid Process 3336 3e3e6f1a8eb7047c6720d62d44bef3d4.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4416 3e3e6f1a8eb7047c6720d62d44bef3d4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4416 3e3e6f1a8eb7047c6720d62d44bef3d4.exe 3336 3e3e6f1a8eb7047c6720d62d44bef3d4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4416 wrote to memory of 3336 4416 3e3e6f1a8eb7047c6720d62d44bef3d4.exe 92 PID 4416 wrote to memory of 3336 4416 3e3e6f1a8eb7047c6720d62d44bef3d4.exe 92 PID 4416 wrote to memory of 3336 4416 3e3e6f1a8eb7047c6720d62d44bef3d4.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e3e6f1a8eb7047c6720d62d44bef3d4.exe"C:\Users\Admin\AppData\Local\Temp\3e3e6f1a8eb7047c6720d62d44bef3d4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\3e3e6f1a8eb7047c6720d62d44bef3d4.exeC:\Users\Admin\AppData\Local\Temp\3e3e6f1a8eb7047c6720d62d44bef3d4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD510a813a050b296d25b031e0f41733fab
SHA1af4735bb04e256a9463f86ecda79c39e1e6ccfb8
SHA256016630f4752a4464dedc50fe5f8c84e4ac71aca4a07a9318fa9480edbc30c423
SHA512694004510b5910bbd7ebd7be02949dc6e34afd066e82c72cd680c7624d0460a334f10819b56becccb02545d57463bc025f05dabac04e652098557d52943eb46e