Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
8fc8b804ab181c2256d94f0b87a9c0ee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8fc8b804ab181c2256d94f0b87a9c0ee.exe
Resource
win10v2004-20231215-en
General
-
Target
8fc8b804ab181c2256d94f0b87a9c0ee.exe
-
Size
385KB
-
MD5
8fc8b804ab181c2256d94f0b87a9c0ee
-
SHA1
961e148de2f769f3ee38c0580399c15b7ef14b06
-
SHA256
68c6a48c7c3b9ba71c523e0f3830b4d992448d8ddb67f451c587e48067a523e0
-
SHA512
b4edc17054562ce46b31f842636362a705638d04263787ea14618485041b0d53cb99253e47f0751c3eb51062c09cbb1fcbf031acfd3c090e8e71aa9229a1faff
-
SSDEEP
6144:elGz8S0/bgyQ/A3DmHNdS6Hlx4m39SNgYlu8F6eCInOhsxfv5krgAzZle+MHMKTs:eIP0//QgDAWQx/tolB79OWxnDAeiKfKB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2324 8fc8b804ab181c2256d94f0b87a9c0ee.exe -
Executes dropped EXE 1 IoCs
pid Process 2324 8fc8b804ab181c2256d94f0b87a9c0ee.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 7 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2944 8fc8b804ab181c2256d94f0b87a9c0ee.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2944 8fc8b804ab181c2256d94f0b87a9c0ee.exe 2324 8fc8b804ab181c2256d94f0b87a9c0ee.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2324 2944 8fc8b804ab181c2256d94f0b87a9c0ee.exe 34 PID 2944 wrote to memory of 2324 2944 8fc8b804ab181c2256d94f0b87a9c0ee.exe 34 PID 2944 wrote to memory of 2324 2944 8fc8b804ab181c2256d94f0b87a9c0ee.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fc8b804ab181c2256d94f0b87a9c0ee.exe"C:\Users\Admin\AppData\Local\Temp\8fc8b804ab181c2256d94f0b87a9c0ee.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\8fc8b804ab181c2256d94f0b87a9c0ee.exeC:\Users\Admin\AppData\Local\Temp\8fc8b804ab181c2256d94f0b87a9c0ee.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5fc94dbe6e4e698e48cc3a25a77699524
SHA1519dc8ef0198dc82a7b21d2d141269ba610378a4
SHA2560170c722f4c93b2d58be1ece8ba724182e4c907aa7ed2c3b8b56dc41d784074c
SHA512cfc17120094c15b1ff46798545ce689129de3984db84ca62e0d2d1ccf0db3155bf807fe36f59d4efa8b7ca80fd2808f42e5c82fdbfa18b605ca19aaac2edec2d