Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    188s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2024, 09:23

General

  • Target

    5030fa5a7f67a7a48b8773bdb002d7d3.exe

  • Size

    385KB

  • MD5

    5030fa5a7f67a7a48b8773bdb002d7d3

  • SHA1

    a0c3646b4c151d7d966e78ccd644a80700da2dd0

  • SHA256

    b58ab04edc19711993bd062bfb04096fc41c3e7702dd2a4326e2b263e157d7d5

  • SHA512

    6b972c26b610e925e0ce7dc99555ba4f358311460cd5fbbc940ed92e85ff95c0492bfd012f8023a1202ad9afe4bffee7b03e845c18bef22a228195623e10f71f

  • SSDEEP

    12288:fkCuuKJ7QI/HDRBMTyBcYRzxpU3e4E1VTJB:fbu70IPQyBxRdi3E1ZJB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5030fa5a7f67a7a48b8773bdb002d7d3.exe
    "C:\Users\Admin\AppData\Local\Temp\5030fa5a7f67a7a48b8773bdb002d7d3.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4388
    • C:\Users\Admin\AppData\Local\Temp\5030fa5a7f67a7a48b8773bdb002d7d3.exe
      C:\Users\Admin\AppData\Local\Temp\5030fa5a7f67a7a48b8773bdb002d7d3.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5030fa5a7f67a7a48b8773bdb002d7d3.exe

    Filesize

    293KB

    MD5

    c7bb5aed543f34a8e72ed0e4f4b188a8

    SHA1

    b711339010e89e5581c4ca10ddc49b8a7eb79d87

    SHA256

    899c6a3a3b429d9553692cf836cd65f5b658593fe6cd8fc05310ce0410a8e6bc

    SHA512

    0fb64c7f21d3fbd380e739dc3819cbb3ccdc8d485fd9b19d91ad396b9d675805764f8ec564273c73a0e00298784806064fef6b476de5b1a3562e29f93c22651b

  • memory/1520-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1520-15-0x0000000001600000-0x0000000001666000-memory.dmp

    Filesize

    408KB

  • memory/1520-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/1520-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1520-20-0x0000000004E90000-0x0000000004EEF000-memory.dmp

    Filesize

    380KB

  • memory/1520-36-0x000000000B600000-0x000000000B63C000-memory.dmp

    Filesize

    240KB

  • memory/1520-35-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1520-37-0x000000000B600000-0x000000000B63C000-memory.dmp

    Filesize

    240KB

  • memory/4388-1-0x00000000015F0000-0x0000000001656000-memory.dmp

    Filesize

    408KB

  • memory/4388-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4388-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4388-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB