Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 16:27
Static task
static1
Behavioral task
behavioral1
Sample
700741fd8151f71d0cf355bc287645b5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
700741fd8151f71d0cf355bc287645b5.exe
Resource
win10v2004-20231215-en
General
-
Target
700741fd8151f71d0cf355bc287645b5.exe
-
Size
771KB
-
MD5
700741fd8151f71d0cf355bc287645b5
-
SHA1
cd8c5ed1c3c4b326f88b3f8e1901d99e9473a845
-
SHA256
60f85eab717212cedc9eea8bee6ef7c6df81ff6e867f2dda90b5f4013f3f4d61
-
SHA512
1be1cd088f278bc9f7b6aa60da0d05c927e7b321fe5d31e6d25ed5d9c3728bf77517e907af203d765958ed60705b4f1741415b703c1b4e89dfa22260f8922568
-
SSDEEP
24576:VeL9YrRvonyJcLV2l7idoWLH/4r8Eb10hJaothZ2/T6FBBB:VeBYrRvonyJkV2l7ZW74r8O/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2944 700741fd8151f71d0cf355bc287645b5.exe -
Executes dropped EXE 1 IoCs
pid Process 2944 700741fd8151f71d0cf355bc287645b5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3796 700741fd8151f71d0cf355bc287645b5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3796 700741fd8151f71d0cf355bc287645b5.exe 2944 700741fd8151f71d0cf355bc287645b5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3796 wrote to memory of 2944 3796 700741fd8151f71d0cf355bc287645b5.exe 86 PID 3796 wrote to memory of 2944 3796 700741fd8151f71d0cf355bc287645b5.exe 86 PID 3796 wrote to memory of 2944 3796 700741fd8151f71d0cf355bc287645b5.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\700741fd8151f71d0cf355bc287645b5.exe"C:\Users\Admin\AppData\Local\Temp\700741fd8151f71d0cf355bc287645b5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\700741fd8151f71d0cf355bc287645b5.exeC:\Users\Admin\AppData\Local\Temp\700741fd8151f71d0cf355bc287645b5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD59c50c57eb6ffce9ae0a481e04f13fce6
SHA10c46e71f8974371083e892477b091c5dff484ff3
SHA2569ffd03ad0a17b36cc391e7cd44ba79f4f5a1da428ffaefc4e3f57cac82f8caa3
SHA512f7d02adffea357909ed2d45188bca473b60ed98221761b9095883ada07eadb4c3f4022cdd7a130aed08e78759c318b098bd20997bc6667937c44db79c33258b8