Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 06:01
Static task
static1
Behavioral task
behavioral1
Sample
a30f93a12081bb2fde8f36005d3cc6fb.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a30f93a12081bb2fde8f36005d3cc6fb.exe
Resource
win10v2004-20240221-en
General
-
Target
a30f93a12081bb2fde8f36005d3cc6fb.exe
-
Size
907KB
-
MD5
a30f93a12081bb2fde8f36005d3cc6fb
-
SHA1
51241e31efaaf084ec142c10c60e224c3cb1fdd9
-
SHA256
bd29ce05091222bbf4c9e5df9aa36b8cce0082913ca8b34dbddea601a2a8dcfa
-
SHA512
1f5d76ee9e73bd6cc425d325c3e82b0a76e67949e4bc2331f421e799ce6d80b342ea7c15a2fecb4ab0031a95fd6c581419a0994ae07f8f4239909b69c0ddf45a
-
SSDEEP
12288:Fz8k5sniS0LCCmUcPfuMiTPVwkmfiBUYlcG2Bw5HT8UUDh0jVDa/ZS1:F5520WCO+FzYfMJpz8hDca/ZS1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1828 a30f93a12081bb2fde8f36005d3cc6fb.exe -
Executes dropped EXE 1 IoCs
pid Process 1828 a30f93a12081bb2fde8f36005d3cc6fb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 7 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4936 a30f93a12081bb2fde8f36005d3cc6fb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4936 a30f93a12081bb2fde8f36005d3cc6fb.exe 1828 a30f93a12081bb2fde8f36005d3cc6fb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4936 wrote to memory of 1828 4936 a30f93a12081bb2fde8f36005d3cc6fb.exe 89 PID 4936 wrote to memory of 1828 4936 a30f93a12081bb2fde8f36005d3cc6fb.exe 89 PID 4936 wrote to memory of 1828 4936 a30f93a12081bb2fde8f36005d3cc6fb.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a30f93a12081bb2fde8f36005d3cc6fb.exe"C:\Users\Admin\AppData\Local\Temp\a30f93a12081bb2fde8f36005d3cc6fb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\a30f93a12081bb2fde8f36005d3cc6fb.exeC:\Users\Admin\AppData\Local\Temp\a30f93a12081bb2fde8f36005d3cc6fb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD58527dc584bb4aeb42c8e7b34f8b150f1
SHA11ca6daf3073d0be0d623a4210cc2e465d00d09ba
SHA2562dd0518241b831c7137eca7a00578827f4426f68d058a0ffc2fe11ade8b7d209
SHA512db147ce3f5529bdbe82e330e381065674f73b6e225e44db14ee81d25e62a5d160709fc2d279a01f0d446a80ac04461bfe94fc2106806a2ce74a762fdb1d3d8ac