Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
49df86cc1c3882421a8455be4a88c13d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49df86cc1c3882421a8455be4a88c13d.exe
Resource
win10v2004-20231215-en
General
-
Target
49df86cc1c3882421a8455be4a88c13d.exe
-
Size
385KB
-
MD5
49df86cc1c3882421a8455be4a88c13d
-
SHA1
5ba5247212d0ec6b98cfaf586153e581c67028db
-
SHA256
779283b0f14504e5b6d8c5d94fb6ceb399f18ac82e70513474c3762e364b6d34
-
SHA512
4c9b3330669b124e7a5b54d08d9089e7eb16f00f7124f8fc8fc240ce2e6c59c29d58800d76a165e9dd3c1e2c4d8c7bd6e90674255a6d168e2fa5a515fc1e1915
-
SSDEEP
6144:pVQjo6tMI42u5sNFZ0ruIHKoGjA6Ij/yT9wtUvVPxdsg8Qrw3B:pKE6tg2ssDZ0tqoG0Fj/3spxdsgGB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4304 49df86cc1c3882421a8455be4a88c13d.exe -
Executes dropped EXE 1 IoCs
pid Process 4304 49df86cc1c3882421a8455be4a88c13d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4616 49df86cc1c3882421a8455be4a88c13d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4616 49df86cc1c3882421a8455be4a88c13d.exe 4304 49df86cc1c3882421a8455be4a88c13d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4304 4616 49df86cc1c3882421a8455be4a88c13d.exe 89 PID 4616 wrote to memory of 4304 4616 49df86cc1c3882421a8455be4a88c13d.exe 89 PID 4616 wrote to memory of 4304 4616 49df86cc1c3882421a8455be4a88c13d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\49df86cc1c3882421a8455be4a88c13d.exe"C:\Users\Admin\AppData\Local\Temp\49df86cc1c3882421a8455be4a88c13d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\49df86cc1c3882421a8455be4a88c13d.exeC:\Users\Admin\AppData\Local\Temp\49df86cc1c3882421a8455be4a88c13d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5a26f96cdaf539258d716389234ffcf31
SHA1f94e84b49af9825b498cb4f23044075a1a5817e3
SHA256025e3a567866e05ec87209f05f7dcb8a04bdbe0e4a9f6b86e54c41d20144ed9f
SHA512f0990a64a90642e92e1d47b604202b446d8cd1f7e59256efc1f641a8fc4950af504ee516f780b39d5ea45f4ceb54165b23c25ecb8bf8f664ff50ee0c4f724061