Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
4e1e53045600e35afc31373dabe83b32.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e1e53045600e35afc31373dabe83b32.exe
Resource
win10v2004-20231215-en
General
-
Target
4e1e53045600e35afc31373dabe83b32.exe
-
Size
771KB
-
MD5
4e1e53045600e35afc31373dabe83b32
-
SHA1
f3b27a32d6a3b9547fb8854eb961b07bcb81cd6f
-
SHA256
c5464b2330cc4f042d5305953082a9941b21e6ec6afa201400efbc296750cad0
-
SHA512
b14f0d2016731297b55876d2ff9ad212adbaba2fd62c81f23b69307d267db97cf22ba7f56b99359d5840f008f230f38db612c729aa788a49fa7105c004089a03
-
SSDEEP
12288:E9J7CuY8pfV+TfprlgkCvvTrINyTb10VHmDXTuFaa2AtyGTKOF25ZoJJyhRge8B/:6J3YufV+XC3Db10hJaothZ2/T6FBBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3212 4e1e53045600e35afc31373dabe83b32.exe -
Executes dropped EXE 1 IoCs
pid Process 3212 4e1e53045600e35afc31373dabe83b32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3448 4e1e53045600e35afc31373dabe83b32.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3448 4e1e53045600e35afc31373dabe83b32.exe 3212 4e1e53045600e35afc31373dabe83b32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3448 wrote to memory of 3212 3448 4e1e53045600e35afc31373dabe83b32.exe 90 PID 3448 wrote to memory of 3212 3448 4e1e53045600e35afc31373dabe83b32.exe 90 PID 3448 wrote to memory of 3212 3448 4e1e53045600e35afc31373dabe83b32.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e1e53045600e35afc31373dabe83b32.exe"C:\Users\Admin\AppData\Local\Temp\4e1e53045600e35afc31373dabe83b32.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\4e1e53045600e35afc31373dabe83b32.exeC:\Users\Admin\AppData\Local\Temp\4e1e53045600e35afc31373dabe83b32.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD5b1ed2cd264bdeffe601f446bb098d99d
SHA121605ddb3c3a35d58e14e3b1075135d6724b7317
SHA2567403c51b427fe23f6283d5b4df24abcb05543dafbe43a95c2498d946041f96d4
SHA51231f3664e25c355dd25d14377446c02290be91ec6d93b3b356b88ed12c8de7453cb22fefd99c1ae1920ebcd4adafec2e5558b00bf58bc27f3a19a80280039c617