Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
163s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
4e9f59442ae1ccbc94aa2c0d41b067f8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e9f59442ae1ccbc94aa2c0d41b067f8.exe
Resource
win10v2004-20231215-en
General
-
Target
4e9f59442ae1ccbc94aa2c0d41b067f8.exe
-
Size
771KB
-
MD5
4e9f59442ae1ccbc94aa2c0d41b067f8
-
SHA1
100108e9fbba2c9108687e732c839b07eccf4235
-
SHA256
6aebb1bd30a44d60aa0da63cdfa40100354d1cef47d182383acf73e317389be9
-
SHA512
9d0b86d705ef12fe7bfebe2f8fb3bf1317a53e2bf7a978e8ebdf5a20adf8debef577a259fad6b709f7bff7cdebbaa69520604411e303ad9b6dea9e28c877146b
-
SSDEEP
12288:thonvAlJ8msO75HjoqJtCVb10VHmDXTuFaa2AtyGTKOF25ZoJJyhRge8BpH9PVB:tOvAb99joqKVb10hJaothZ2/T6FBBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 4e9f59442ae1ccbc94aa2c0d41b067f8.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 4e9f59442ae1ccbc94aa2c0d41b067f8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2060 4e9f59442ae1ccbc94aa2c0d41b067f8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2060 4e9f59442ae1ccbc94aa2c0d41b067f8.exe 2660 4e9f59442ae1ccbc94aa2c0d41b067f8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2660 2060 4e9f59442ae1ccbc94aa2c0d41b067f8.exe 87 PID 2060 wrote to memory of 2660 2060 4e9f59442ae1ccbc94aa2c0d41b067f8.exe 87 PID 2060 wrote to memory of 2660 2060 4e9f59442ae1ccbc94aa2c0d41b067f8.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e9f59442ae1ccbc94aa2c0d41b067f8.exe"C:\Users\Admin\AppData\Local\Temp\4e9f59442ae1ccbc94aa2c0d41b067f8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\4e9f59442ae1ccbc94aa2c0d41b067f8.exeC:\Users\Admin\AppData\Local\Temp\4e9f59442ae1ccbc94aa2c0d41b067f8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD540e0c8fcc760116999da449958da8c33
SHA19301bc8282df6d6a156bd92a21b7117271fe00bc
SHA256bb6e45573ae9d75e1e5b5cd62f755f061ad7bcba4f541831efeabcad11846301
SHA512e067bddcccff1d7de434f4581365197f952b0f973c3cae365917babab0fca23e1b94d44d320b273bb0fdc8b24beeec3ac624107b717c769c756827e7cd7ad9af