Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
4dbef2307682edfb4fa38bc078695e5e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4dbef2307682edfb4fa38bc078695e5e.exe
Resource
win10v2004-20231215-en
General
-
Target
4dbef2307682edfb4fa38bc078695e5e.exe
-
Size
385KB
-
MD5
4dbef2307682edfb4fa38bc078695e5e
-
SHA1
e030ce809249da8d9879a21bf3189dcb9f7329e9
-
SHA256
6537df3bc5e433af707e92fac23d798cf609743435465c83a6adce0714c9b6a6
-
SHA512
b959c1e0841a7da6ea9339e7514a5eb7256f09b7f5243c65ea9811804f72bca3d2ad7219fca3dd0453d317757985d02d5302ce830452844638d3b56e20d46c9c
-
SSDEEP
12288:XrfQdSlgrYi/UKW7E2BHxtMZRqGXsAIqB:8olQYuUb7ntxtQBXs5qB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2088 4dbef2307682edfb4fa38bc078695e5e.exe -
Executes dropped EXE 1 IoCs
pid Process 2088 4dbef2307682edfb4fa38bc078695e5e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4068 4dbef2307682edfb4fa38bc078695e5e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4068 4dbef2307682edfb4fa38bc078695e5e.exe 2088 4dbef2307682edfb4fa38bc078695e5e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4068 wrote to memory of 2088 4068 4dbef2307682edfb4fa38bc078695e5e.exe 34 PID 4068 wrote to memory of 2088 4068 4dbef2307682edfb4fa38bc078695e5e.exe 34 PID 4068 wrote to memory of 2088 4068 4dbef2307682edfb4fa38bc078695e5e.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dbef2307682edfb4fa38bc078695e5e.exe"C:\Users\Admin\AppData\Local\Temp\4dbef2307682edfb4fa38bc078695e5e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\4dbef2307682edfb4fa38bc078695e5e.exeC:\Users\Admin\AppData\Local\Temp\4dbef2307682edfb4fa38bc078695e5e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD559587167e3b4714077d43602a9e95fa6
SHA1107d4fb2cce355b554b039f3e76b8aa3e7ed92a9
SHA2561615e10844c36c4303f850274c1fc4b94e430c880199c3c39adf283276dbd23e
SHA5120898dbd0268993ddb26471badf9c3a0dde43e9e985e4a8dac2d25291329ab6881ebfe9766d09e3aeeb94937b260f3a8e631254b9483fb2bfbddf23c86158f99c