Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
7e1af9d88c00e037e6b62f4e42681947.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e1af9d88c00e037e6b62f4e42681947.exe
Resource
win10v2004-20231215-en
General
-
Target
7e1af9d88c00e037e6b62f4e42681947.exe
-
Size
385KB
-
MD5
7e1af9d88c00e037e6b62f4e42681947
-
SHA1
66830be74d5066a2200b3d520b7f78cc7427a989
-
SHA256
45e9964a934162b7e73d8ff78dc8cf597accf5afae7702fea6c2e29bb5afda7a
-
SHA512
c5eb46c320c1a6d0b0fb20e14cdf28d8da6797d7641d28fbda7bbc14f0d608496ee50a15799f85ae1c1f834d3a73e8f3425656a927bca8acfb17a723a63c0943
-
SSDEEP
6144:Q+6JschDO8cIKY0hJAHsLq9Ic0tFDdgDCeryLwDMpHeU35uowhSaD4DB:QQqXKrh6HQ0a9G6wDMpPu9hPD4DB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1512 7e1af9d88c00e037e6b62f4e42681947.exe -
Executes dropped EXE 1 IoCs
pid Process 1512 7e1af9d88c00e037e6b62f4e42681947.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 8 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4692 7e1af9d88c00e037e6b62f4e42681947.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4692 7e1af9d88c00e037e6b62f4e42681947.exe 1512 7e1af9d88c00e037e6b62f4e42681947.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4692 wrote to memory of 1512 4692 7e1af9d88c00e037e6b62f4e42681947.exe 83 PID 4692 wrote to memory of 1512 4692 7e1af9d88c00e037e6b62f4e42681947.exe 83 PID 4692 wrote to memory of 1512 4692 7e1af9d88c00e037e6b62f4e42681947.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e1af9d88c00e037e6b62f4e42681947.exe"C:\Users\Admin\AppData\Local\Temp\7e1af9d88c00e037e6b62f4e42681947.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\7e1af9d88c00e037e6b62f4e42681947.exeC:\Users\Admin\AppData\Local\Temp\7e1af9d88c00e037e6b62f4e42681947.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD51ee62c7b0a886274ab8454b19967bc45
SHA1222007055c3b5ce96512dce560b224f3d13a64b1
SHA2564945b411f8a50a57613b69101cbb0491cac511b01af96a7106c2fef810946ba8
SHA512646a85364913d409a9804db398a9707816565c57b98ffceb83d3449010896152579981e38958c3bc552ad6403b4c27e4594e4e52f3bfa38f546c0a5324507245