Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
9b5844a6e214d41e98b0c3a20e70f2c4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b5844a6e214d41e98b0c3a20e70f2c4.exe
Resource
win10v2004-20231215-en
General
-
Target
9b5844a6e214d41e98b0c3a20e70f2c4.exe
-
Size
385KB
-
MD5
9b5844a6e214d41e98b0c3a20e70f2c4
-
SHA1
20f0fd12955c28924a9202102065c4c87507ed75
-
SHA256
a798fa4e66eea514535e574866eda9f77bd48269ce9ee1a45a00b5d56618dbd5
-
SHA512
97e133b4d2dd94e5c890865bdd56768ba5fe454a79a49727d11c42187144196e570e6c3f52f69ed1589d501568db4758964f2e326b9f93db444f456d59febd75
-
SSDEEP
6144:9anRwzCHRkIp2lj0ThZrR6ea4V3RMxOM92OEvcwSMnevUeNWpEwGuB:9JCHuI8aT3rDa5OM92OWcwpnLeQbB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1364 9b5844a6e214d41e98b0c3a20e70f2c4.exe -
Executes dropped EXE 1 IoCs
pid Process 1364 9b5844a6e214d41e98b0c3a20e70f2c4.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4400 9b5844a6e214d41e98b0c3a20e70f2c4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4400 9b5844a6e214d41e98b0c3a20e70f2c4.exe 1364 9b5844a6e214d41e98b0c3a20e70f2c4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4400 wrote to memory of 1364 4400 9b5844a6e214d41e98b0c3a20e70f2c4.exe 86 PID 4400 wrote to memory of 1364 4400 9b5844a6e214d41e98b0c3a20e70f2c4.exe 86 PID 4400 wrote to memory of 1364 4400 9b5844a6e214d41e98b0c3a20e70f2c4.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b5844a6e214d41e98b0c3a20e70f2c4.exe"C:\Users\Admin\AppData\Local\Temp\9b5844a6e214d41e98b0c3a20e70f2c4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\9b5844a6e214d41e98b0c3a20e70f2c4.exeC:\Users\Admin\AppData\Local\Temp\9b5844a6e214d41e98b0c3a20e70f2c4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5d0e6511ed0b895f9b9f2a1428b772e83
SHA1ab9fb3aa9d34ae2f5d250ae8147ffc8f4c7711c3
SHA256c8ed76ad7036208dd7f5f0495abec154d7cbdff583eff809060621cc65d0aee5
SHA512a1dabe1f3c43bcf801d3bbc6ea6e43c63266e42060993b0d295ad260e5e69b6f23370a9583ecab068a58653a68b8b65b2b290dd3faff340665a3d0edb3650176