Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
7d3a7017efd5ad34d2eae6c785805eb8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7d3a7017efd5ad34d2eae6c785805eb8.exe
Resource
win10v2004-20231215-en
General
-
Target
7d3a7017efd5ad34d2eae6c785805eb8.exe
-
Size
385KB
-
MD5
7d3a7017efd5ad34d2eae6c785805eb8
-
SHA1
bd5f82f81e3e33df79c398562c337e6428511d21
-
SHA256
a5259cd6bdec5567ffdc4f1b7e8ef5b6764ee9ebb69cca23d0b91530b5dd5dc7
-
SHA512
3691fbbb54de3d852f7b9feb59e178bef0ed723457c85282b7b103e686660bf1c175dd531fbcca90d23d4d1d0f45d75c4037e0218d55318c5ff9a00c72642cc0
-
SSDEEP
12288:2WJDRVrmRRiNIvKWGDFyk6FtztrTIqdQtXNi/ETueB:ZDvqKGqQk6FLrEqdQt9i/GueB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4548 7d3a7017efd5ad34d2eae6c785805eb8.exe -
Executes dropped EXE 1 IoCs
pid Process 4548 7d3a7017efd5ad34d2eae6c785805eb8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1464 7d3a7017efd5ad34d2eae6c785805eb8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1464 7d3a7017efd5ad34d2eae6c785805eb8.exe 4548 7d3a7017efd5ad34d2eae6c785805eb8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1464 wrote to memory of 4548 1464 7d3a7017efd5ad34d2eae6c785805eb8.exe 84 PID 1464 wrote to memory of 4548 1464 7d3a7017efd5ad34d2eae6c785805eb8.exe 84 PID 1464 wrote to memory of 4548 1464 7d3a7017efd5ad34d2eae6c785805eb8.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d3a7017efd5ad34d2eae6c785805eb8.exe"C:\Users\Admin\AppData\Local\Temp\7d3a7017efd5ad34d2eae6c785805eb8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\7d3a7017efd5ad34d2eae6c785805eb8.exeC:\Users\Admin\AppData\Local\Temp\7d3a7017efd5ad34d2eae6c785805eb8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD58256185abc5d399d9e1e0b09856d2a55
SHA1da00834784855495762989f53fafe380a96bbe7f
SHA256546eea3435b1edc9893f1d1eb48c50695170b1a29faeded1ffe2171efc034058
SHA512039e4b154a342a6cad758e52a2aecaf7af2d2274b4f6eaaac9c5e9e4478ec329636b4d97d9f73001d37f5799726a353dd48cb79b9349979cc2e486a82845d1c4