Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
669abd76749eeb7e4184762923e4f7b6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
669abd76749eeb7e4184762923e4f7b6.exe
Resource
win10v2004-20231215-en
General
-
Target
669abd76749eeb7e4184762923e4f7b6.exe
-
Size
385KB
-
MD5
669abd76749eeb7e4184762923e4f7b6
-
SHA1
33ab1e312a4fe5d46ad4f318f93691639c6d2366
-
SHA256
2fcd125df352ef88395f1c5b003640202a5c7a30e2ba1bd636b7100b34eccff9
-
SHA512
17836351a4d3d1a5e5e3b0f216a66716389fb7f28007dbd8b7a2cf91ec95dab1e0155d73d6ce5b2f408501345fca53cd1579c4cc57b5b3e4a8435a9044028e58
-
SSDEEP
6144:gsVsWnRQwkxHd/9PslCTlS6vtnVeEiS3Oj6c3VVsn0CiW4WbFnB:g8RbqHd/9Pm4lS+eE366aVSV9xnB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3828 669abd76749eeb7e4184762923e4f7b6.exe -
Executes dropped EXE 1 IoCs
pid Process 3828 669abd76749eeb7e4184762923e4f7b6.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1364 669abd76749eeb7e4184762923e4f7b6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1364 669abd76749eeb7e4184762923e4f7b6.exe 3828 669abd76749eeb7e4184762923e4f7b6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1364 wrote to memory of 3828 1364 669abd76749eeb7e4184762923e4f7b6.exe 85 PID 1364 wrote to memory of 3828 1364 669abd76749eeb7e4184762923e4f7b6.exe 85 PID 1364 wrote to memory of 3828 1364 669abd76749eeb7e4184762923e4f7b6.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\669abd76749eeb7e4184762923e4f7b6.exe"C:\Users\Admin\AppData\Local\Temp\669abd76749eeb7e4184762923e4f7b6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\669abd76749eeb7e4184762923e4f7b6.exeC:\Users\Admin\AppData\Local\Temp\669abd76749eeb7e4184762923e4f7b6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5d5c67fefe90b56d995a07fe49eb30797
SHA13982e4830958a1fa47a2eb5bced9ed1912a1b2c1
SHA2564f3dc67092787af903447a37b13050258bd2ac44be50e5654b294cdfe4c63069
SHA512dd436d9b797329eb46d0bcee2dafdf4a8573d9d9a4abcc58b787a079c058a685a8de65a569aa4ecc126ec8de596549e31d7c4528ce76cac1c2cd3a6563f1c122