Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
8fd77e7eb95bbcd715f33ec54c9494ba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8fd77e7eb95bbcd715f33ec54c9494ba.exe
Resource
win10v2004-20231215-en
General
-
Target
8fd77e7eb95bbcd715f33ec54c9494ba.exe
-
Size
385KB
-
MD5
8fd77e7eb95bbcd715f33ec54c9494ba
-
SHA1
fd891dada5aa391a434516a908a5eb41ac85ca56
-
SHA256
8af32ff549bd8d8268d6a26fd0ec8531fc72201db260ca841744c2d9be5faeb1
-
SHA512
966bfc29aa660b8660544ff30de6491e84cb5bf5c5b03a1f0374e78e1197f16e60c87974443edc7a8cf6aad65d15b18e98e31738ee0095df8e581cf712ed4642
-
SSDEEP
6144:tjsvN1bcd82bPrfyZiEPStnwWLJnSMfDw3tkcT7+tr2ivG0B:SzbcdPfMi8StnwWlSMrw3hm/fB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 684 8fd77e7eb95bbcd715f33ec54c9494ba.exe -
Executes dropped EXE 1 IoCs
pid Process 684 8fd77e7eb95bbcd715f33ec54c9494ba.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 7 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2188 8fd77e7eb95bbcd715f33ec54c9494ba.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2188 8fd77e7eb95bbcd715f33ec54c9494ba.exe 684 8fd77e7eb95bbcd715f33ec54c9494ba.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2188 wrote to memory of 684 2188 8fd77e7eb95bbcd715f33ec54c9494ba.exe 85 PID 2188 wrote to memory of 684 2188 8fd77e7eb95bbcd715f33ec54c9494ba.exe 85 PID 2188 wrote to memory of 684 2188 8fd77e7eb95bbcd715f33ec54c9494ba.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fd77e7eb95bbcd715f33ec54c9494ba.exe"C:\Users\Admin\AppData\Local\Temp\8fd77e7eb95bbcd715f33ec54c9494ba.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\8fd77e7eb95bbcd715f33ec54c9494ba.exeC:\Users\Admin\AppData\Local\Temp\8fd77e7eb95bbcd715f33ec54c9494ba.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD588629c17aee7bb62942b5d3be61e6f6f
SHA16e3095d97895cb33c8db57864ad7fbc0f282e491
SHA2568ba3d839be47ca67172f8cc8290e51431c2f6b1893a378b5d091c4ce93a6b961
SHA512db8c56e3fedd8dc2e493ce676f5f6256ef9ad7f514a45e3763f775210edc657a095f1e17977a0c5cf452922fcd1cc3287b3a63a7dc0186b2ac25527f6747632d