Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
7dc8ff20a16e33d9ff05c844cd67dbda.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7dc8ff20a16e33d9ff05c844cd67dbda.exe
Resource
win10v2004-20231215-en
General
-
Target
7dc8ff20a16e33d9ff05c844cd67dbda.exe
-
Size
385KB
-
MD5
7dc8ff20a16e33d9ff05c844cd67dbda
-
SHA1
99bd4611bd16733a5e56baa0e9a3c6f031241fc8
-
SHA256
71f861ed5e537a587609c9189c020ba7126887a71c5908c32ed78880ceb5680a
-
SHA512
0f8dcaafb04f993e6c933aa3f86c30b5fec84dbf364a4b8247033df255f9b03b8c90ff7cbbe64fa2d0cc61748309d72cd31fb8a1d3c37cd56543be31c5e411ac
-
SSDEEP
6144:dTp5Z+ACJlH0MtcjTaCBb09HW3vi3ym/w3bJnAx/Ky4Ef3CBlNRXjKzRCzuYsTCV:jW/H0jjugb09HwviT8AQ60RXpy6HkEB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4788 7dc8ff20a16e33d9ff05c844cd67dbda.exe -
Executes dropped EXE 1 IoCs
pid Process 4788 7dc8ff20a16e33d9ff05c844cd67dbda.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 7 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3832 7dc8ff20a16e33d9ff05c844cd67dbda.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3832 7dc8ff20a16e33d9ff05c844cd67dbda.exe 4788 7dc8ff20a16e33d9ff05c844cd67dbda.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3832 wrote to memory of 4788 3832 7dc8ff20a16e33d9ff05c844cd67dbda.exe 84 PID 3832 wrote to memory of 4788 3832 7dc8ff20a16e33d9ff05c844cd67dbda.exe 84 PID 3832 wrote to memory of 4788 3832 7dc8ff20a16e33d9ff05c844cd67dbda.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dc8ff20a16e33d9ff05c844cd67dbda.exe"C:\Users\Admin\AppData\Local\Temp\7dc8ff20a16e33d9ff05c844cd67dbda.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\7dc8ff20a16e33d9ff05c844cd67dbda.exeC:\Users\Admin\AppData\Local\Temp\7dc8ff20a16e33d9ff05c844cd67dbda.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD59eec32db38eed64e0e5e529a43cbfe21
SHA1d6886bac43831e970076684f901a86a6c32bc4ac
SHA25668cbd47a3da04c326e67f101ae924417056eb4a0dd54da7f2dfead43b67f7ac9
SHA512047c32461fcdb6a9b27adc72c6990c2abce59dc2f68258dd185564ce2600c823f77ff58c49dc8f66bb0ee671fbca548eae3729641f1a377038c1729593b2129a