Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
89s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
8f76aa892e32a40b1dee2d37481250c1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f76aa892e32a40b1dee2d37481250c1.exe
Resource
win10v2004-20231222-en
General
-
Target
8f76aa892e32a40b1dee2d37481250c1.exe
-
Size
385KB
-
MD5
8f76aa892e32a40b1dee2d37481250c1
-
SHA1
a9ac3ad93992f1e31fd51d39ccaf061d116a19ba
-
SHA256
f572b2d21508bb7171a01e988defbb8ffc9793c01e3deffa0bbbc1c8803b2e81
-
SHA512
2411bf51119d6356f9137bc63a3b6936799344740f44ad54521c0513f9c1a1eda6499079e1ba503edbaea54b6149c8b1700eba3ebf78cf5e19f52b0b4d8c625a
-
SSDEEP
6144:Sjb3bsL5CrSy8of9ksT4fsMW3mRK5szmotKHXX77D1w/FXBxpWV8G/LHSG3RzDhE:SnTnHXjD10JBxtGTHR50efEmvN2NcMB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2432 8f76aa892e32a40b1dee2d37481250c1.exe -
Executes dropped EXE 1 IoCs
pid Process 2432 8f76aa892e32a40b1dee2d37481250c1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4968 8f76aa892e32a40b1dee2d37481250c1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4968 8f76aa892e32a40b1dee2d37481250c1.exe 2432 8f76aa892e32a40b1dee2d37481250c1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4968 wrote to memory of 2432 4968 8f76aa892e32a40b1dee2d37481250c1.exe 45 PID 4968 wrote to memory of 2432 4968 8f76aa892e32a40b1dee2d37481250c1.exe 45 PID 4968 wrote to memory of 2432 4968 8f76aa892e32a40b1dee2d37481250c1.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f76aa892e32a40b1dee2d37481250c1.exe"C:\Users\Admin\AppData\Local\Temp\8f76aa892e32a40b1dee2d37481250c1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\8f76aa892e32a40b1dee2d37481250c1.exeC:\Users\Admin\AppData\Local\Temp\8f76aa892e32a40b1dee2d37481250c1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5961800d403d8b2c671b03bf84b6d9b6a
SHA188fc9bf265661e3f5ed0a191378e20e698c33bfe
SHA256886ed56d7eb0f70ecc314e23e7a080f0aac14a9ea29acc709701e4598320861b
SHA512bddc09960c297be11b751c64f02119f53fe9e2a04677ab78243367527cb6449e33fe340deb0c04ef1674bcd0392d7d7f2065ad8f539922434352ce1dd8b30e51