Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 03:22
Static task
static1
Behavioral task
behavioral1
Sample
8e168cfd0f93c0a3b91455e4a28c2a20.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e168cfd0f93c0a3b91455e4a28c2a20.exe
Resource
win10v2004-20231222-en
General
-
Target
8e168cfd0f93c0a3b91455e4a28c2a20.exe
-
Size
385KB
-
MD5
8e168cfd0f93c0a3b91455e4a28c2a20
-
SHA1
5eb30b4f3831d9633cb7a7e181ae68b25c84ff54
-
SHA256
ec298fb63554fda962c5c45d53b5834b369ccce3857a1d9e51c39cd73e524c34
-
SHA512
ceeba9da5bcfecd9268dfe77ed309a358647035dca5ef1bd2aa781f025b1314d87125c050b80860ca9d47ec3902fbcff912ff09ba285490a1bdd2126b4c9b5d2
-
SSDEEP
12288:A38pDr6qtO7T/wP71zHYf7iBHbE+37GZZBB:AyP6qOHoPxaQbESoZBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4108 8e168cfd0f93c0a3b91455e4a28c2a20.exe -
Executes dropped EXE 1 IoCs
pid Process 4108 8e168cfd0f93c0a3b91455e4a28c2a20.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 7 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3800 8e168cfd0f93c0a3b91455e4a28c2a20.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3800 8e168cfd0f93c0a3b91455e4a28c2a20.exe 4108 8e168cfd0f93c0a3b91455e4a28c2a20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3800 wrote to memory of 4108 3800 8e168cfd0f93c0a3b91455e4a28c2a20.exe 87 PID 3800 wrote to memory of 4108 3800 8e168cfd0f93c0a3b91455e4a28c2a20.exe 87 PID 3800 wrote to memory of 4108 3800 8e168cfd0f93c0a3b91455e4a28c2a20.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e168cfd0f93c0a3b91455e4a28c2a20.exe"C:\Users\Admin\AppData\Local\Temp\8e168cfd0f93c0a3b91455e4a28c2a20.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\8e168cfd0f93c0a3b91455e4a28c2a20.exeC:\Users\Admin\AppData\Local\Temp\8e168cfd0f93c0a3b91455e4a28c2a20.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5fa0f851fbf692050cb547c956c2d9d04
SHA109c6d5cd7ea39e077c40f9810aa67f6f92e7cc61
SHA25666876a176e90b1f6043aa24b86399bf769d58f6dcdf5e8dc31ed64cf90c87b7d
SHA51240fab502dd95b39e5be004a27cf8a5559052d515ca75a20d18e803e0722a94f6bc82dfbbb1e27085792b80309a964c4aff1fabdae36e97ea23d847dad32dabf5