Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
ac7817443164c6e6e2cebff2e81267af.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac7817443164c6e6e2cebff2e81267af.exe
Resource
win10v2004-20240226-en
General
-
Target
ac7817443164c6e6e2cebff2e81267af.exe
-
Size
385KB
-
MD5
ac7817443164c6e6e2cebff2e81267af
-
SHA1
82f7f76dc6b8b2004be84f0d6066869bef84f25a
-
SHA256
a2119e63f1c726d80dbc5a83e28960f0e736288cde88add008acaaeed81e0567
-
SHA512
c9e9af41b4aea0fbc971604e56d7ec2d68ab0ca4fd9e9d92c0d141183aece100f7ce8b14d9290c04cf995ccb0800f74c0cf4654536478f6ed1fc3c54f0837579
-
SSDEEP
6144:gsVsWnwQwkxHd/9PslCTlS6vtnVeEiS3Oj6c3VVsn0CiW4WbFnB:g8wbqHd/9Pm4lS+eE366aVSV9xnB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2028 ac7817443164c6e6e2cebff2e81267af.exe -
Executes dropped EXE 1 IoCs
pid Process 2028 ac7817443164c6e6e2cebff2e81267af.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 pastebin.com 13 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3192 ac7817443164c6e6e2cebff2e81267af.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3192 ac7817443164c6e6e2cebff2e81267af.exe 2028 ac7817443164c6e6e2cebff2e81267af.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3192 wrote to memory of 2028 3192 ac7817443164c6e6e2cebff2e81267af.exe 94 PID 3192 wrote to memory of 2028 3192 ac7817443164c6e6e2cebff2e81267af.exe 94 PID 3192 wrote to memory of 2028 3192 ac7817443164c6e6e2cebff2e81267af.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac7817443164c6e6e2cebff2e81267af.exe"C:\Users\Admin\AppData\Local\Temp\ac7817443164c6e6e2cebff2e81267af.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\ac7817443164c6e6e2cebff2e81267af.exeC:\Users\Admin\AppData\Local\Temp\ac7817443164c6e6e2cebff2e81267af.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4052 --field-trial-handle=2972,i,4036376905309803364,5412922217215781933,262144 --variations-seed-version /prefetch:81⤵PID:812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5acc8be278db31e0cbef8421482fecb7e
SHA19865c7a3d854a8da59a49645a9e92076cce8117c
SHA2561b5380023c8cf28c5af5d8aad2ea1184cd7dc08cc1321d16c7a8f753e88be692
SHA512d1a5959052ea6c27e466c2a301e3ae95451e67b08be458303ef41d387e7bf1779c9fbc54053564c7494f9ecb851ed8366f2f9626b9252ed4058b8534689d1f49