Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
86s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
7900455766a83a2a732f6d24ff676133.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7900455766a83a2a732f6d24ff676133.exe
Resource
win10v2004-20231222-en
General
-
Target
7900455766a83a2a732f6d24ff676133.exe
-
Size
907KB
-
MD5
7900455766a83a2a732f6d24ff676133
-
SHA1
944f9b0f46eb94704b8f1dec00d019ea4ed02504
-
SHA256
8b9d15b0abd9ebfe7bc5f29df3b7a2c04fc8e58330e1bea45e95f47a29dde793
-
SHA512
1a1da77a462fca3aade36a5bfc0038a7b90f64ceb459d0118b70940648e8c312ff1b518b054a2851dbdd3943e73b3a9847d1a47360755a75e6658a43cbcc12a1
-
SSDEEP
12288:DlgSU/6hirc8fhizm7dIShJfbH8U4WWNdhWjYsldfQ8mwe/E+n/e0u/ZZXjVDa/S:Dlg0uclqRIcbgrNdgddARe0u/7Va/ZS1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3704 7900455766a83a2a732f6d24ff676133.exe -
Executes dropped EXE 1 IoCs
pid Process 3704 7900455766a83a2a732f6d24ff676133.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 7 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1136 7900455766a83a2a732f6d24ff676133.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1136 7900455766a83a2a732f6d24ff676133.exe 3704 7900455766a83a2a732f6d24ff676133.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1136 wrote to memory of 3704 1136 7900455766a83a2a732f6d24ff676133.exe 89 PID 1136 wrote to memory of 3704 1136 7900455766a83a2a732f6d24ff676133.exe 89 PID 1136 wrote to memory of 3704 1136 7900455766a83a2a732f6d24ff676133.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7900455766a83a2a732f6d24ff676133.exe"C:\Users\Admin\AppData\Local\Temp\7900455766a83a2a732f6d24ff676133.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\7900455766a83a2a732f6d24ff676133.exeC:\Users\Admin\AppData\Local\Temp\7900455766a83a2a732f6d24ff676133.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD58481491e63804c3464f2c4c45a933874
SHA1dafeab52161201b0e05540d1a1d4af110cbc2de3
SHA256c562f91322b45f3d5196d688f47be0ea38c9cfd6869f4f426d7277b50a08cae9
SHA5126ba430650b10d5f4966c18a882139845a9a38836063b9b322a5dfe4ec7207da2884de9dfbae8bbfb657587bd971f074b3820fd5d292e4de028b4d2021ac8f2b4