Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
4889e406b015dce5291411a0f210fdb8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4889e406b015dce5291411a0f210fdb8.exe
Resource
win10v2004-20231215-en
General
-
Target
4889e406b015dce5291411a0f210fdb8.exe
-
Size
385KB
-
MD5
4889e406b015dce5291411a0f210fdb8
-
SHA1
476af05b8bf9244e8340c516fa54ffe4e4f7333d
-
SHA256
abd961ca505f441c0beaecb509bf4b2abc56b22835263672777a48e7f3dec2da
-
SHA512
fbd81f659b1ec83b901378580f1f394f9577c1874a854e8f9fb3b57ff5c00e64af6a8c7ee256b18a948bc73f1553583ac127e5cf1e088bf42ec6f1a2ed29b7ff
-
SSDEEP
6144:1RFz4v0p3axGd66rQpTjek9ISnLcNI9jWDyX5PUadTr2LNP3VD2B:1jz4spYFVek9jLcegyPUadPI3VSB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4120 4889e406b015dce5291411a0f210fdb8.exe -
Executes dropped EXE 1 IoCs
pid Process 4120 4889e406b015dce5291411a0f210fdb8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2516 4889e406b015dce5291411a0f210fdb8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2516 4889e406b015dce5291411a0f210fdb8.exe 4120 4889e406b015dce5291411a0f210fdb8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2516 wrote to memory of 4120 2516 4889e406b015dce5291411a0f210fdb8.exe 92 PID 2516 wrote to memory of 4120 2516 4889e406b015dce5291411a0f210fdb8.exe 92 PID 2516 wrote to memory of 4120 2516 4889e406b015dce5291411a0f210fdb8.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4889e406b015dce5291411a0f210fdb8.exe"C:\Users\Admin\AppData\Local\Temp\4889e406b015dce5291411a0f210fdb8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\4889e406b015dce5291411a0f210fdb8.exeC:\Users\Admin\AppData\Local\Temp\4889e406b015dce5291411a0f210fdb8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5e00ee7b77a92844a4bcd361c2649c7d0
SHA1216b8ccd3ed74e70729b6790e4b648fce8803e42
SHA25672ca4d6257ade3e3da9cb5de97133e0d44bf2a81b2de18ae3d4a2397ac859f48
SHA5123defda6cf23b6491a3d53754804a639e04208e3ba8e52ab49b8c207a0b848a0798d28ff0651bcf3ee24464aaf2f12b44cac4678f526f9154b5f9e758acd8f529