Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
8e554acd68c11a9be2ad1d1fd8084e98.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e554acd68c11a9be2ad1d1fd8084e98.exe
Resource
win10v2004-20231215-en
General
-
Target
8e554acd68c11a9be2ad1d1fd8084e98.exe
-
Size
771KB
-
MD5
8e554acd68c11a9be2ad1d1fd8084e98
-
SHA1
ef3d57088d971a07c95e2e5f648f67735b84ebd2
-
SHA256
2d25249118a02cf29002a537534e150f4e178ac38303e5e1b13c3889d3dea6c4
-
SHA512
ddc4f1a8cb9422d6d6ec9358edd4bf1bc2e860bff8fbbd640294edb5bc4bc16a12099c97994e2843cb4936844e36dbf32378135ce0290378895b96502c22356c
-
SSDEEP
24576:i5yGSxqCGd6sn4Wb10hJaothZ2/T6FBBB:fxDkF4Q/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3792 8e554acd68c11a9be2ad1d1fd8084e98.exe -
Executes dropped EXE 1 IoCs
pid Process 3792 8e554acd68c11a9be2ad1d1fd8084e98.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 8 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4272 8e554acd68c11a9be2ad1d1fd8084e98.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4272 8e554acd68c11a9be2ad1d1fd8084e98.exe 3792 8e554acd68c11a9be2ad1d1fd8084e98.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4272 wrote to memory of 3792 4272 8e554acd68c11a9be2ad1d1fd8084e98.exe 84 PID 4272 wrote to memory of 3792 4272 8e554acd68c11a9be2ad1d1fd8084e98.exe 84 PID 4272 wrote to memory of 3792 4272 8e554acd68c11a9be2ad1d1fd8084e98.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e554acd68c11a9be2ad1d1fd8084e98.exe"C:\Users\Admin\AppData\Local\Temp\8e554acd68c11a9be2ad1d1fd8084e98.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\8e554acd68c11a9be2ad1d1fd8084e98.exeC:\Users\Admin\AppData\Local\Temp\8e554acd68c11a9be2ad1d1fd8084e98.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD55b754dddf5775e9f81ece415b55505f0
SHA1356b6a7b9a03759c9eed908c0892a95f0b8544b1
SHA2569fc4673f78eea2b769eb8b886db6deee35faf493465631b22d3c0304c9f8b00b
SHA5121963af9c9de188c90e34ed89c692c77ecada095637a80fcc9107f2e8715685e95db4e4dbf1a284fd3b6efd82b04ec52ddb5176ecb2e173bb2a59d24342b50ccf