Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 23:08
Static task
static1
Behavioral task
behavioral1
Sample
b5e3e2cbf28ea36ca7bc786b592f14ff.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5e3e2cbf28ea36ca7bc786b592f14ff.exe
Resource
win10v2004-20240226-en
General
-
Target
b5e3e2cbf28ea36ca7bc786b592f14ff.exe
-
Size
385KB
-
MD5
b5e3e2cbf28ea36ca7bc786b592f14ff
-
SHA1
b3408b4d76b7bd8b7bb13959da96087e35f32894
-
SHA256
b44bdbcba81c9c50ee1abef9a313bb2d8392eab1f7abf0f2b57bd343f75bf4b6
-
SHA512
1f2fa932fdbfc4ffe6590984e891de34d11c0f4e3ee4f5e653ddffbf40d5f543e0f07221bafad834824826c4a113b275472a045c6e073578c588f6269ae7f4d3
-
SSDEEP
12288:PmQNtkGp+Up1PimA3+MYXA4jFEUmwi6w9E+wmEMB:PDkGraVOMYXbFr/iD98OB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3292 b5e3e2cbf28ea36ca7bc786b592f14ff.exe -
Executes dropped EXE 1 IoCs
pid Process 3292 b5e3e2cbf28ea36ca7bc786b592f14ff.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 10 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1412 b5e3e2cbf28ea36ca7bc786b592f14ff.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1412 b5e3e2cbf28ea36ca7bc786b592f14ff.exe 3292 b5e3e2cbf28ea36ca7bc786b592f14ff.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1412 wrote to memory of 3292 1412 b5e3e2cbf28ea36ca7bc786b592f14ff.exe 89 PID 1412 wrote to memory of 3292 1412 b5e3e2cbf28ea36ca7bc786b592f14ff.exe 89 PID 1412 wrote to memory of 3292 1412 b5e3e2cbf28ea36ca7bc786b592f14ff.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5e3e2cbf28ea36ca7bc786b592f14ff.exe"C:\Users\Admin\AppData\Local\Temp\b5e3e2cbf28ea36ca7bc786b592f14ff.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\b5e3e2cbf28ea36ca7bc786b592f14ff.exeC:\Users\Admin\AppData\Local\Temp\b5e3e2cbf28ea36ca7bc786b592f14ff.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD52e817757d6b74a569d92365b33681dc3
SHA1a47da4b9c3b743fd9c4fa0d909500247ef8a259f
SHA256fc47c5eeb25a071ff777f09945586d66e3a116314052918306c09d3d42f24f4b
SHA5123e35e60e18e8c291906750bc59096d35aa21f2413d6256ad1e7f2406af7059faef8db5c8cdc3a2efec67d19a50ed26e7b403aafe14f254e9a2ce9b3bdf10ff6f