Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
757921a773335f07f1d0b95d25e26560.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
757921a773335f07f1d0b95d25e26560.exe
Resource
win10v2004-20231215-en
General
-
Target
757921a773335f07f1d0b95d25e26560.exe
-
Size
385KB
-
MD5
757921a773335f07f1d0b95d25e26560
-
SHA1
eddec8de8d71a6aa8d1ef320aee27f2268625e57
-
SHA256
ba24debc6aec82f0f9c325aa7ae0b802abc509dc975ad262117326ae08334500
-
SHA512
bfdd6d36e1fb08612c7c27ba42cf0183775db0819d7ce4c8f97b48f3a41c0f59c1ce936e54202814350d4a58abfb619c7e93d899c816262db5606f60281a872c
-
SSDEEP
12288:jIrrD1Xmj4K4W+2thGeuaSPgM9Z6Li8WB:yrMj4KHfuNPD98LiXB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1124 757921a773335f07f1d0b95d25e26560.exe -
Executes dropped EXE 1 IoCs
pid Process 1124 757921a773335f07f1d0b95d25e26560.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 6 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4908 757921a773335f07f1d0b95d25e26560.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4908 757921a773335f07f1d0b95d25e26560.exe 1124 757921a773335f07f1d0b95d25e26560.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4908 wrote to memory of 1124 4908 757921a773335f07f1d0b95d25e26560.exe 87 PID 4908 wrote to memory of 1124 4908 757921a773335f07f1d0b95d25e26560.exe 87 PID 4908 wrote to memory of 1124 4908 757921a773335f07f1d0b95d25e26560.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\757921a773335f07f1d0b95d25e26560.exe"C:\Users\Admin\AppData\Local\Temp\757921a773335f07f1d0b95d25e26560.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\757921a773335f07f1d0b95d25e26560.exeC:\Users\Admin\AppData\Local\Temp\757921a773335f07f1d0b95d25e26560.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5b7021b6c40619e7668b7d8148417e46f
SHA15076b42deb2908e483e3608cb845d29f00db1b0d
SHA256250ae9702d5915f3d2c9cdfd06093aa7683f87d1d01193cfd41b537f3ff3b486
SHA512e955c8988df8c1db3b82abd44f273ce125626755301631fc09412730d619a50ab6fe17decfd78718f2558cca7e0088e244e22916ed8515dbc918139c2403294f