Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
75095254b6b84c567db25f0885fdbea4.exe
Resource
win7-20231215-en
General
-
Target
75095254b6b84c567db25f0885fdbea4.exe
-
Size
385KB
-
MD5
75095254b6b84c567db25f0885fdbea4
-
SHA1
d44383edba434a7cfe47787b252c92a9fcc509ce
-
SHA256
ae93608491c5720158eccab3f3bf83cd4c5b3f4e6df93b08a8a14d7d9b9621e2
-
SHA512
9b193af97be3bdac40aa58fb01ba079d09f0ad9a890d78692bf75c1cfe598bb07eec652cc18535cb9eda8b7b4eee39a62b04d8093aa211d15414ab576bf681d9
-
SSDEEP
12288:hQgQXE+kMZ7KXlOlU73ABD7OQ50MORnlrYgB:iPE+kMBulyU7Q2fnrB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3272 75095254b6b84c567db25f0885fdbea4.exe -
Executes dropped EXE 1 IoCs
pid Process 3272 75095254b6b84c567db25f0885fdbea4.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 9 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4416 75095254b6b84c567db25f0885fdbea4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4416 75095254b6b84c567db25f0885fdbea4.exe 3272 75095254b6b84c567db25f0885fdbea4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4416 wrote to memory of 3272 4416 75095254b6b84c567db25f0885fdbea4.exe 85 PID 4416 wrote to memory of 3272 4416 75095254b6b84c567db25f0885fdbea4.exe 85 PID 4416 wrote to memory of 3272 4416 75095254b6b84c567db25f0885fdbea4.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\75095254b6b84c567db25f0885fdbea4.exe"C:\Users\Admin\AppData\Local\Temp\75095254b6b84c567db25f0885fdbea4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\75095254b6b84c567db25f0885fdbea4.exeC:\Users\Admin\AppData\Local\Temp\75095254b6b84c567db25f0885fdbea4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD521a9ced7e9c2607f2c5114b2332b1438
SHA1ffa37d6732cf5bae4d32ca628148943f5b67fa06
SHA256976a1534f2dfb4eddc82c1f38e0a56c19e6bfaf5d2ef33fc8fa919338d8278bf
SHA51208dddaad851c31b6f3b0efd622aabbba36570d857939a3f37ca5c31e00d0943f3e9e0499b0163b4de33f53f42661e28e3058034179bb8f0547a69bddec31119e