Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
76c84aaf1e833d2c9016a37ebf56ee2e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76c84aaf1e833d2c9016a37ebf56ee2e.exe
Resource
win10v2004-20231215-en
General
-
Target
76c84aaf1e833d2c9016a37ebf56ee2e.exe
-
Size
771KB
-
MD5
76c84aaf1e833d2c9016a37ebf56ee2e
-
SHA1
29e6a6de3eac2b848a0206f1ad1f1f67acd56bcc
-
SHA256
36c12784e0cb6423136e1a4a457e1a8b8230508eb873e8179042661d86d912c8
-
SHA512
0e713b02f5959666ee8e3bd0b5defa56251a163c32530279093ad34e4878731743b612fad73a01dc61573f21784558273d42eadae5af6537fb19312d97788733
-
SSDEEP
24576:fbi70IPQyBxRdi3E1ZJb10hJaothZ2/T6FBBB:jGZy6Z1/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4576 76c84aaf1e833d2c9016a37ebf56ee2e.exe -
Executes dropped EXE 1 IoCs
pid Process 4576 76c84aaf1e833d2c9016a37ebf56ee2e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 6 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2692 76c84aaf1e833d2c9016a37ebf56ee2e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2692 76c84aaf1e833d2c9016a37ebf56ee2e.exe 4576 76c84aaf1e833d2c9016a37ebf56ee2e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4576 2692 76c84aaf1e833d2c9016a37ebf56ee2e.exe 88 PID 2692 wrote to memory of 4576 2692 76c84aaf1e833d2c9016a37ebf56ee2e.exe 88 PID 2692 wrote to memory of 4576 2692 76c84aaf1e833d2c9016a37ebf56ee2e.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\76c84aaf1e833d2c9016a37ebf56ee2e.exe"C:\Users\Admin\AppData\Local\Temp\76c84aaf1e833d2c9016a37ebf56ee2e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\76c84aaf1e833d2c9016a37ebf56ee2e.exeC:\Users\Admin\AppData\Local\Temp\76c84aaf1e833d2c9016a37ebf56ee2e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD5444c6bbbb8bb24fe7bd1a03500a214ee
SHA171e21d082cd651f6038db27face8832a9d8e3466
SHA25624b1521dd0d205cdfca9f4d514755245fd892c9247ddb7379343d12de90a7d5a
SHA51227c2e37f53a0b44fdd826fb0257abd6ac1eaa5be0e56125263ae1d98abae28482452249591c235001f57de404e0531e18b727e6e90f2b47f096a188e9271bc80