Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
87s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
7a77ee7ed053bd2d5bf060b825276670.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a77ee7ed053bd2d5bf060b825276670.exe
Resource
win10v2004-20231215-en
General
-
Target
7a77ee7ed053bd2d5bf060b825276670.exe
-
Size
385KB
-
MD5
7a77ee7ed053bd2d5bf060b825276670
-
SHA1
ac33ac1dd71c5c4ba432d4786c5236f74767b950
-
SHA256
64630c50a0e8aa5029a5207cb1ff0f24636a49fd1576d41b57743e067cb8768a
-
SHA512
c2be6a7795678c2073ec188e5640f107e2bbbcf1aed0b60cca2cb0efc3e7c98186485650a04a169074d67256d2135028677068a2102f60a519893fcae137db22
-
SSDEEP
6144:txWeHLd4Nsa2ClA4a7fzdiYYevuPARo+JtW1O4M6aA/a3OaceB:rWeHLxa7lVWrdiYxFRo+J8bi3vB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4024 7a77ee7ed053bd2d5bf060b825276670.exe -
Executes dropped EXE 1 IoCs
pid Process 4024 7a77ee7ed053bd2d5bf060b825276670.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 9 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5060 7a77ee7ed053bd2d5bf060b825276670.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5060 7a77ee7ed053bd2d5bf060b825276670.exe 4024 7a77ee7ed053bd2d5bf060b825276670.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4024 5060 7a77ee7ed053bd2d5bf060b825276670.exe 88 PID 5060 wrote to memory of 4024 5060 7a77ee7ed053bd2d5bf060b825276670.exe 88 PID 5060 wrote to memory of 4024 5060 7a77ee7ed053bd2d5bf060b825276670.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a77ee7ed053bd2d5bf060b825276670.exe"C:\Users\Admin\AppData\Local\Temp\7a77ee7ed053bd2d5bf060b825276670.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\7a77ee7ed053bd2d5bf060b825276670.exeC:\Users\Admin\AppData\Local\Temp\7a77ee7ed053bd2d5bf060b825276670.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD56beb89f676150cb79e4a752632b49e37
SHA13b6347fc1d41c1082d65f8237421ba4d8abbbe7a
SHA25628d25226e5b33e930b8400c25b2a7a0fa041adec0b6244ce662f6365b9ba9bde
SHA512d6911e359e40a5659297a5950ba6eb779ad1e6bf18cdd274effd4a384fac15179d93c2fc4dd1cd9542bf71300cf0631833756d071cee520b1416c8eec043e3d7