Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
9658f4e070b2f59aba4316a1f899b6cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9658f4e070b2f59aba4316a1f899b6cb.exe
Resource
win10v2004-20231215-en
General
-
Target
9658f4e070b2f59aba4316a1f899b6cb.exe
-
Size
771KB
-
MD5
9658f4e070b2f59aba4316a1f899b6cb
-
SHA1
8f83b42b83375485a2ae75b38b399f55cd5523e5
-
SHA256
06fda9e989d5b4f8c3a4d8b1c63e8991b16ecec9df69d703af6c200e1643a87b
-
SHA512
c03ffa73900e38d5189a303954dea8c15cd038e136511f22f2b0a9663430cce57ffa63c8cd107bbc3f015f34e55a773bb6630e09821404a8b8e0c97e22eef94b
-
SSDEEP
24576:LVnVz1Y3XNqckJYpub10hJaothZ2/T6FBBB:LVnVMTkJcY/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2248 9658f4e070b2f59aba4316a1f899b6cb.exe -
Executes dropped EXE 1 IoCs
pid Process 2248 9658f4e070b2f59aba4316a1f899b6cb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 5 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4136 9658f4e070b2f59aba4316a1f899b6cb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4136 9658f4e070b2f59aba4316a1f899b6cb.exe 2248 9658f4e070b2f59aba4316a1f899b6cb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4136 wrote to memory of 2248 4136 9658f4e070b2f59aba4316a1f899b6cb.exe 85 PID 4136 wrote to memory of 2248 4136 9658f4e070b2f59aba4316a1f899b6cb.exe 85 PID 4136 wrote to memory of 2248 4136 9658f4e070b2f59aba4316a1f899b6cb.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9658f4e070b2f59aba4316a1f899b6cb.exe"C:\Users\Admin\AppData\Local\Temp\9658f4e070b2f59aba4316a1f899b6cb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\9658f4e070b2f59aba4316a1f899b6cb.exeC:\Users\Admin\AppData\Local\Temp\9658f4e070b2f59aba4316a1f899b6cb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD5fd7a6ac3a7574de0ee03faed348f8ad6
SHA1c45f3bec18659e101335ccafc5927b14eada2ea1
SHA256ea3e3bf20420a525baedecdc2e1e91b1aa74a5c605b6331a0e52ac3f84af326d
SHA512c693b47074e6cd3aee91efdf03434f90ab11dd25c7bf7b9947487e29b3eaa467f9bde05611c3faae36340fd0f3cfbb8f508f64d4e6cea9ae74454ad6665f4efd