Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
56017a5cd35eb55c433634478af2992d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56017a5cd35eb55c433634478af2992d.exe
Resource
win10v2004-20231215-en
General
-
Target
56017a5cd35eb55c433634478af2992d.exe
-
Size
1.5MB
-
MD5
56017a5cd35eb55c433634478af2992d
-
SHA1
e65083fcdccbe78d22fee967b098aa40e61816f4
-
SHA256
56fce36bfab7bb62a96d7aae9312b1b096ee07d7f3fa15eb8aa55b290cb00bf0
-
SHA512
445e4057d893f74aadec3bd880546555d3b6ba80abe7338c3685d4e78b27eacc40d87fe1fca1defac8a487d37e9bd471a3d3b56c61959842eae3d0661f80d351
-
SSDEEP
24576:ITKrfd5pCX0fdwb10hJaothZ2/T6FBBTqnZ8nUPDmb10hJaothZ2/T6FBBT:IslxfdC/ofNqnSnoM/ofp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1528 56017a5cd35eb55c433634478af2992d.exe -
Executes dropped EXE 1 IoCs
pid Process 1528 56017a5cd35eb55c433634478af2992d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3488 56017a5cd35eb55c433634478af2992d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3488 56017a5cd35eb55c433634478af2992d.exe 1528 56017a5cd35eb55c433634478af2992d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3488 wrote to memory of 1528 3488 56017a5cd35eb55c433634478af2992d.exe 90 PID 3488 wrote to memory of 1528 3488 56017a5cd35eb55c433634478af2992d.exe 90 PID 3488 wrote to memory of 1528 3488 56017a5cd35eb55c433634478af2992d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\56017a5cd35eb55c433634478af2992d.exe"C:\Users\Admin\AppData\Local\Temp\56017a5cd35eb55c433634478af2992d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\56017a5cd35eb55c433634478af2992d.exeC:\Users\Admin\AppData\Local\Temp\56017a5cd35eb55c433634478af2992d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD502bc3412864fdccc505ccb95d922491b
SHA1d0a2d049c01c39556738e40a1cb21ac1843db3b2
SHA256077955ec4aaf71d61f505179c45d9e7a22b51574d37a22d9bba3190e1f317241
SHA51273a25880dfb0cf6064c47eaba7c707f894d0675cb4c33e93932c5126970f8d4575cc2db9e4b82278708f9cf6cc320d8f30d3355cc95359ecccf45e99f1abd492