Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
545854b51fd3f65c9b26078375a50247.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
545854b51fd3f65c9b26078375a50247.exe
Resource
win10v2004-20231215-en
General
-
Target
545854b51fd3f65c9b26078375a50247.exe
-
Size
385KB
-
MD5
545854b51fd3f65c9b26078375a50247
-
SHA1
8d5e00ee967171d666a152fc0c18b148011d4f4d
-
SHA256
19f3f28f48e1410fb94eb2be6a94f7a441f48bb5990d60e2cbb9cced2efa3c22
-
SHA512
efca3b146804b8c70b5c57686b2203790468a4c367dfd6d0265d558f5e4713ba9a1cd9794c9407d77b1bb0f2dc03b28cb66ecf96a722866fca5d9e2e4d59de76
-
SSDEEP
12288:oqDmoh1+2Nm14QJ9UtN7uIS8zAsg6jp3bGKB:oqDH+HJ9nIhm6jpLtB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1964 545854b51fd3f65c9b26078375a50247.exe -
Executes dropped EXE 1 IoCs
pid Process 1964 545854b51fd3f65c9b26078375a50247.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4756 545854b51fd3f65c9b26078375a50247.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4756 545854b51fd3f65c9b26078375a50247.exe 1964 545854b51fd3f65c9b26078375a50247.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4756 wrote to memory of 1964 4756 545854b51fd3f65c9b26078375a50247.exe 91 PID 4756 wrote to memory of 1964 4756 545854b51fd3f65c9b26078375a50247.exe 91 PID 4756 wrote to memory of 1964 4756 545854b51fd3f65c9b26078375a50247.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\545854b51fd3f65c9b26078375a50247.exe"C:\Users\Admin\AppData\Local\Temp\545854b51fd3f65c9b26078375a50247.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\545854b51fd3f65c9b26078375a50247.exeC:\Users\Admin\AppData\Local\Temp\545854b51fd3f65c9b26078375a50247.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5a83a99adef00675abbcfd916ed9ea876
SHA1c2b4f62940c668c8b6e4e660c7881d4654fcc1df
SHA2560a3490eacab3f422523d44dee7dd69ad44482b979f2efe5c4e01725e40892cdf
SHA512396f6ea010420fcf504fbdc5217be6871e254fc4e9e11ec3cdc762fa44f7af339e1e02cccfca42bfaf25358fc92f07d0a9b05ae679ea92955481de992e0c3041