Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
a1a19f0c1203aef7eb654b48345fc3a2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1a19f0c1203aef7eb654b48345fc3a2.exe
Resource
win10v2004-20240221-en
General
-
Target
a1a19f0c1203aef7eb654b48345fc3a2.exe
-
Size
385KB
-
MD5
a1a19f0c1203aef7eb654b48345fc3a2
-
SHA1
28cd839d07d80cced35f7d482f30d0f04ab05112
-
SHA256
2568a1d3c40aa2e0157895e46e6208f55df230e57ec45005bca18ac06165eeec
-
SHA512
48b1fe2894175a37fbb6c86703d09b2594648870cc99443a7c8f11dca60eb323867d32b95097d9da64c34370dc329b7b89f9442ac5d37b7fda9555ee252fc17b
-
SSDEEP
6144:3kWEWNkcxxBP7V7G6H4UFi8xYw9811tBANXujEGTFJlUTYB:HEyNxBjVq6H9Hxz981BEC/luYB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 316 a1a19f0c1203aef7eb654b48345fc3a2.exe -
Executes dropped EXE 1 IoCs
pid Process 316 a1a19f0c1203aef7eb654b48345fc3a2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 pastebin.com 15 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3372 a1a19f0c1203aef7eb654b48345fc3a2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3372 a1a19f0c1203aef7eb654b48345fc3a2.exe 316 a1a19f0c1203aef7eb654b48345fc3a2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3372 wrote to memory of 316 3372 a1a19f0c1203aef7eb654b48345fc3a2.exe 87 PID 3372 wrote to memory of 316 3372 a1a19f0c1203aef7eb654b48345fc3a2.exe 87 PID 3372 wrote to memory of 316 3372 a1a19f0c1203aef7eb654b48345fc3a2.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1a19f0c1203aef7eb654b48345fc3a2.exe"C:\Users\Admin\AppData\Local\Temp\a1a19f0c1203aef7eb654b48345fc3a2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\a1a19f0c1203aef7eb654b48345fc3a2.exeC:\Users\Admin\AppData\Local\Temp\a1a19f0c1203aef7eb654b48345fc3a2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD539f68f2764eaca8306864865c5ab7ec1
SHA1dd23e25bd5fc357c44bdb8ffcae6f7b383231e3a
SHA256401e222bd9b2b2c051e1f81e5c52a9c886f13d377f6fe1611f106e170e309663
SHA5122141692096a71c0431f682d3b0806096ecab8bafd1298bf24f33248c40af2259a841766c9f1c3f3e6dc4cfb4ae276e1d8a93adfedd0c875fc2f85bed80fb117c