Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
8795e406982147ed0af376e985f53e66.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8795e406982147ed0af376e985f53e66.exe
Resource
win10v2004-20231215-en
General
-
Target
8795e406982147ed0af376e985f53e66.exe
-
Size
385KB
-
MD5
8795e406982147ed0af376e985f53e66
-
SHA1
809fd7047c36a1a17adc2670b59d68e8132214e2
-
SHA256
2d7637535379c69a825a452a0376f2f283448d44e2078ea14d947d7c186ccd3e
-
SHA512
e07a785607b044d249c25d7187c528580c83c6943d6a35ee56afe3ac173877440a71bb809275f32422b4dcdb023cebae71fc3d0979dcdc96a5572aad8ec656ac
-
SSDEEP
6144:Rxq6V1u8pQD/xQezlrlnCzkyP99vR0GvCpOVGgTKfgNqWESRMgYLB:rq6y8pQtQezvnCIyvc6xR5iB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1012 8795e406982147ed0af376e985f53e66.exe -
Executes dropped EXE 1 IoCs
pid Process 1012 8795e406982147ed0af376e985f53e66.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 pastebin.com 8 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4260 8795e406982147ed0af376e985f53e66.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4260 8795e406982147ed0af376e985f53e66.exe 1012 8795e406982147ed0af376e985f53e66.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4260 wrote to memory of 1012 4260 8795e406982147ed0af376e985f53e66.exe 84 PID 4260 wrote to memory of 1012 4260 8795e406982147ed0af376e985f53e66.exe 84 PID 4260 wrote to memory of 1012 4260 8795e406982147ed0af376e985f53e66.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8795e406982147ed0af376e985f53e66.exe"C:\Users\Admin\AppData\Local\Temp\8795e406982147ed0af376e985f53e66.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\8795e406982147ed0af376e985f53e66.exeC:\Users\Admin\AppData\Local\Temp\8795e406982147ed0af376e985f53e66.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5904d6b631d79b9c36ca676d433ec62e0
SHA1b526f899a44130e251586c9b9c8b7106981d5b11
SHA25641fe3d4a41903d654feb08b6f6eb41b8c9705ebc4486c0c0794377ffbf8609b9
SHA512e519c5640b4fe8b76456c6afc0806f95f8b6a095c276e9ef4320be27620278fa014905f66583fe9286fc4db18f9e29dd2f5691449b9a5395df69ba4ce2b82b0e