Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
58c3bb0b6f43606fc0470cb40ff9eca8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58c3bb0b6f43606fc0470cb40ff9eca8.exe
Resource
win10v2004-20231222-en
General
-
Target
58c3bb0b6f43606fc0470cb40ff9eca8.exe
-
Size
385KB
-
MD5
58c3bb0b6f43606fc0470cb40ff9eca8
-
SHA1
4279b6a4e203eaae69455838eac976a44c6f8ef3
-
SHA256
fba483eb0a67c65f639a832f0ede4574c77c70141945de2de030f390d2458077
-
SHA512
86bc14632aff7ecfd81046f36175d328a2d0e40bfd5881fa1a757e5b5f328d876ac57dcf0d186bdd50c08dede6233fdf0038930e2c6f1508b2abc1eb7a1d88dc
-
SSDEEP
6144:VF/57C22z2rD7pCUsQtG/9zd+6oJAXwDAjPhlp5+HerASB0N9YosVOalOEY24v+B:VOSxCWG0AgDmTgIBQ9eEwOEY2ZB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4024 58c3bb0b6f43606fc0470cb40ff9eca8.exe -
Executes dropped EXE 1 IoCs
pid Process 4024 58c3bb0b6f43606fc0470cb40ff9eca8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1960 58c3bb0b6f43606fc0470cb40ff9eca8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1960 58c3bb0b6f43606fc0470cb40ff9eca8.exe 4024 58c3bb0b6f43606fc0470cb40ff9eca8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1960 wrote to memory of 4024 1960 58c3bb0b6f43606fc0470cb40ff9eca8.exe 88 PID 1960 wrote to memory of 4024 1960 58c3bb0b6f43606fc0470cb40ff9eca8.exe 88 PID 1960 wrote to memory of 4024 1960 58c3bb0b6f43606fc0470cb40ff9eca8.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\58c3bb0b6f43606fc0470cb40ff9eca8.exe"C:\Users\Admin\AppData\Local\Temp\58c3bb0b6f43606fc0470cb40ff9eca8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\58c3bb0b6f43606fc0470cb40ff9eca8.exeC:\Users\Admin\AppData\Local\Temp\58c3bb0b6f43606fc0470cb40ff9eca8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD5f4dd9a026bcb1957b3bb44cb966624ba
SHA145511d9ad969829d6d33d38109a435af8612dfbb
SHA25643e49f85355fb93e1f763dd0d8267f08097259b7ef2b9bc017eb57d9cec38ecd
SHA512fffd575b7650803b02622eb043ffa469dcebb1f40d836bb6e7db312b2ef7f7aaa540abd514eebcfc673b1fbc0c9c6d0a1ffb9f334a5f08823f992360c53e6502