Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 18:18

General

  • Target

    72b84fdf8ab0328a663adf3f553512e5.exe

  • Size

    385KB

  • MD5

    72b84fdf8ab0328a663adf3f553512e5

  • SHA1

    18ca11df8ba16bb517c32d4c9ab5b7a366dcece4

  • SHA256

    9db611df6f9e669e1f2feb1fbefcd06f5a62a0bc324637da144553bbae2ad4ad

  • SHA512

    20551a1c113d3611c25ea1a6a7013a5d0d7aaaef54a3604d410a79e276b7641e97330cf7a953b7a70183bd3911f3ff29a2b7a073a29c816a26b0038b6453c14b

  • SSDEEP

    6144:r7P5SL5MszYsQgBwR2I4mYIFHhSFiVa30pTC9s8z2nlSjW9gXixmjKRzZo4toUB:r9COsMsvQ2IZzBS2uGeuBxzIjKRZvB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72b84fdf8ab0328a663adf3f553512e5.exe
    "C:\Users\Admin\AppData\Local\Temp\72b84fdf8ab0328a663adf3f553512e5.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4232
    • C:\Users\Admin\AppData\Local\Temp\72b84fdf8ab0328a663adf3f553512e5.exe
      C:\Users\Admin\AppData\Local\Temp\72b84fdf8ab0328a663adf3f553512e5.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\72b84fdf8ab0328a663adf3f553512e5.exe

    Filesize

    385KB

    MD5

    3d3a32e5f5f38e0ebe85ae3e44943030

    SHA1

    f6964f5e0005109c92364159a7736635de45ef72

    SHA256

    1be47f37e369454420159350f901efd52b0e96221c4187340a5af1c4f03d8230

    SHA512

    7e81cf5f3f35f778e21f52ef1722fd5258b1f034939674781087ed14bee44bcdeafe77f63ff25e4a4f9517e652a2313d7d7ac365b64d22774eab93027e1ae9ae

  • memory/3884-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3884-14-0x0000000000140000-0x00000000001A6000-memory.dmp

    Filesize

    408KB

  • memory/3884-20-0x0000000004EA0000-0x0000000004EFF000-memory.dmp

    Filesize

    380KB

  • memory/3884-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/3884-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3884-32-0x000000000B600000-0x000000000B63C000-memory.dmp

    Filesize

    240KB

  • memory/3884-36-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4232-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4232-1-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/4232-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4232-12-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB