Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
58e4fdba8a2178eb8509841de4f33e37.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58e4fdba8a2178eb8509841de4f33e37.exe
Resource
win10v2004-20231215-en
General
-
Target
58e4fdba8a2178eb8509841de4f33e37.exe
-
Size
385KB
-
MD5
58e4fdba8a2178eb8509841de4f33e37
-
SHA1
3890a22ccf39e4f93b4e0475020268c0eb3caa39
-
SHA256
918a6b486ff6f08d02cabe08520ae6f4a83f31edbb56ee0256d70940acea5c10
-
SHA512
d83709257dabd9b1f1b4fab1e994d7503ecb8f63d0e672e348d11aa602ee2e6a3663cf1a70471200bed2120f0d514e092631625405a2419bc9f8d0cf06e72d7d
-
SSDEEP
6144:x6rOl8ljNA4fYp2CyNS2wVpz2JYtL0yUuF09/HC/9hO5lHblohzIXNpy7B:x6OlS8hpSs5UkjfO5lHbYqIB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5028 58e4fdba8a2178eb8509841de4f33e37.exe -
Executes dropped EXE 1 IoCs
pid Process 5028 58e4fdba8a2178eb8509841de4f33e37.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2316 58e4fdba8a2178eb8509841de4f33e37.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2316 58e4fdba8a2178eb8509841de4f33e37.exe 5028 58e4fdba8a2178eb8509841de4f33e37.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2316 wrote to memory of 5028 2316 58e4fdba8a2178eb8509841de4f33e37.exe 87 PID 2316 wrote to memory of 5028 2316 58e4fdba8a2178eb8509841de4f33e37.exe 87 PID 2316 wrote to memory of 5028 2316 58e4fdba8a2178eb8509841de4f33e37.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\58e4fdba8a2178eb8509841de4f33e37.exe"C:\Users\Admin\AppData\Local\Temp\58e4fdba8a2178eb8509841de4f33e37.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\58e4fdba8a2178eb8509841de4f33e37.exeC:\Users\Admin\AppData\Local\Temp\58e4fdba8a2178eb8509841de4f33e37.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD58f6d97e496462ffca70eb1b58f692975
SHA1df95056383b40a2128917ed9e9eb06fa56c20624
SHA25611471db15270350d7cfc8790eac406d3bd0c00e746980fb2349132575bfd8286
SHA512b6c9efb3e9c05b4df96416372554f01c338d7e3c735388ed58d38600aabbef90a338fdb251eab96c9b02d2574fdc705262beb5e743c69c7ddddf00a32101772a