Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
a2c3d3fd4ef0994f3d39e8f4889e90ab.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a2c3d3fd4ef0994f3d39e8f4889e90ab.exe
Resource
win10v2004-20240221-en
General
-
Target
a2c3d3fd4ef0994f3d39e8f4889e90ab.exe
-
Size
907KB
-
MD5
a2c3d3fd4ef0994f3d39e8f4889e90ab
-
SHA1
972c39ce0d7d134fe51301409a31224d8c4a1f92
-
SHA256
2831c2d0d45e247af09545f3fd44ea29dc7599d4cec272097f0d1ffd27d959e8
-
SHA512
555445de39bdf3882f6cc2c4618e4e32d1ea753e5053027915cbfa70a27f0140fb8acdaf2a8f6051e100d6f54576e1acdf4cbfad386ee8c84dd54ff2ac90ad6b
-
SSDEEP
12288:39TqD5cE9eyigKWAe+5BkogcJTLUQ/mDq4BNRxmo2kzjVDa/ZS1:82ytKln+anUQX4HRwtwa/ZS1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3172 a2c3d3fd4ef0994f3d39e8f4889e90ab.exe -
Executes dropped EXE 1 IoCs
pid Process 3172 a2c3d3fd4ef0994f3d39e8f4889e90ab.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 pastebin.com 13 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5084 a2c3d3fd4ef0994f3d39e8f4889e90ab.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5084 a2c3d3fd4ef0994f3d39e8f4889e90ab.exe 3172 a2c3d3fd4ef0994f3d39e8f4889e90ab.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5084 wrote to memory of 3172 5084 a2c3d3fd4ef0994f3d39e8f4889e90ab.exe 87 PID 5084 wrote to memory of 3172 5084 a2c3d3fd4ef0994f3d39e8f4889e90ab.exe 87 PID 5084 wrote to memory of 3172 5084 a2c3d3fd4ef0994f3d39e8f4889e90ab.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2c3d3fd4ef0994f3d39e8f4889e90ab.exe"C:\Users\Admin\AppData\Local\Temp\a2c3d3fd4ef0994f3d39e8f4889e90ab.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\a2c3d3fd4ef0994f3d39e8f4889e90ab.exeC:\Users\Admin\AppData\Local\Temp\a2c3d3fd4ef0994f3d39e8f4889e90ab.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5d2699ef052785893146b26fa624724fb
SHA18c55c385d60da0033eb14047e8d20ff8f3262692
SHA256dc2c8c728d541040604698ebca047d306b5ddf490fad1ce885f0e359e6ce6749
SHA512f33bce007558be07a2fefd10b6da772898fa324e23295f0b95799f0455d596c6d814a4191d28dc8751c603fc08e88c40f0aa57f9e2edfd0d0a1361e95fea7bbd