Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
72b84fdf8ab0328a663adf3f553512e5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
72b84fdf8ab0328a663adf3f553512e5.exe
Resource
win10v2004-20231215-en
General
-
Target
72b84fdf8ab0328a663adf3f553512e5.exe
-
Size
385KB
-
MD5
72b84fdf8ab0328a663adf3f553512e5
-
SHA1
18ca11df8ba16bb517c32d4c9ab5b7a366dcece4
-
SHA256
9db611df6f9e669e1f2feb1fbefcd06f5a62a0bc324637da144553bbae2ad4ad
-
SHA512
20551a1c113d3611c25ea1a6a7013a5d0d7aaaef54a3604d410a79e276b7641e97330cf7a953b7a70183bd3911f3ff29a2b7a073a29c816a26b0038b6453c14b
-
SSDEEP
6144:r7P5SL5MszYsQgBwR2I4mYIFHhSFiVa30pTC9s8z2nlSjW9gXixmjKRzZo4toUB:r9COsMsvQ2IZzBS2uGeuBxzIjKRZvB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3884 72b84fdf8ab0328a663adf3f553512e5.exe -
Executes dropped EXE 1 IoCs
pid Process 3884 72b84fdf8ab0328a663adf3f553512e5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4232 72b84fdf8ab0328a663adf3f553512e5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4232 72b84fdf8ab0328a663adf3f553512e5.exe 3884 72b84fdf8ab0328a663adf3f553512e5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4232 wrote to memory of 3884 4232 72b84fdf8ab0328a663adf3f553512e5.exe 88 PID 4232 wrote to memory of 3884 4232 72b84fdf8ab0328a663adf3f553512e5.exe 88 PID 4232 wrote to memory of 3884 4232 72b84fdf8ab0328a663adf3f553512e5.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\72b84fdf8ab0328a663adf3f553512e5.exe"C:\Users\Admin\AppData\Local\Temp\72b84fdf8ab0328a663adf3f553512e5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\72b84fdf8ab0328a663adf3f553512e5.exeC:\Users\Admin\AppData\Local\Temp\72b84fdf8ab0328a663adf3f553512e5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD53d3a32e5f5f38e0ebe85ae3e44943030
SHA1f6964f5e0005109c92364159a7736635de45ef72
SHA2561be47f37e369454420159350f901efd52b0e96221c4187340a5af1c4f03d8230
SHA5127e81cf5f3f35f778e21f52ef1722fd5258b1f034939674781087ed14bee44bcdeafe77f63ff25e4a4f9517e652a2313d7d7ac365b64d22774eab93027e1ae9ae