Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
8a2506bff345f35bf743bc85898ff034.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8a2506bff345f35bf743bc85898ff034.exe
Resource
win10v2004-20231215-en
General
-
Target
8a2506bff345f35bf743bc85898ff034.exe
-
Size
385KB
-
MD5
8a2506bff345f35bf743bc85898ff034
-
SHA1
ea279d0d841752a0200ff60337cfb9815bbad74f
-
SHA256
06661a5df77ec5461ad9f6e24bced5cd0682e8ae6cb43981e749dfa895c8244c
-
SHA512
9c3c66bd7d557116e6dd063aad2af93741ca6a9e7a7627e3a615b961204cd71b8dd87d5e4ae4f26a44de1d606e9e8d84dfd3b631697ed45e043d7bcab8282f40
-
SSDEEP
6144:PjbwMBTRcVfkmwhUentyNv7eSMxnnIqLhNkP+qzKrYUv5QBBOJDCC2s2CHEOn3tB:1ReIKenc7Cxnn3hu+frFv5QBkt9B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4328 8a2506bff345f35bf743bc85898ff034.exe -
Executes dropped EXE 1 IoCs
pid Process 4328 8a2506bff345f35bf743bc85898ff034.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 8 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 224 8a2506bff345f35bf743bc85898ff034.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 224 8a2506bff345f35bf743bc85898ff034.exe 4328 8a2506bff345f35bf743bc85898ff034.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 224 wrote to memory of 4328 224 8a2506bff345f35bf743bc85898ff034.exe 84 PID 224 wrote to memory of 4328 224 8a2506bff345f35bf743bc85898ff034.exe 84 PID 224 wrote to memory of 4328 224 8a2506bff345f35bf743bc85898ff034.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a2506bff345f35bf743bc85898ff034.exe"C:\Users\Admin\AppData\Local\Temp\8a2506bff345f35bf743bc85898ff034.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\8a2506bff345f35bf743bc85898ff034.exeC:\Users\Admin\AppData\Local\Temp\8a2506bff345f35bf743bc85898ff034.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5fe0dcc469bc761a68b95dec7afe9fae8
SHA188a22b1a1667735d0210e20d6db77b538adc3501
SHA25615ab737c48f12e8a9898cd953944ff12f3e290beeb5947482035c30eefa062a6
SHA51260e838659dc30afe5396cb5bc7260f46a8d9810d0ba274378c8ab8deea36e0ef7555bc21af15cc363eadd214a3bea631c032f192d2c188f48313a45ad1b97191