Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
b5fac17dfc00e5e1bb1549b7f8ad9e11.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5fac17dfc00e5e1bb1549b7f8ad9e11.exe
Resource
win10v2004-20240226-en
General
-
Target
b5fac17dfc00e5e1bb1549b7f8ad9e11.exe
-
Size
385KB
-
MD5
b5fac17dfc00e5e1bb1549b7f8ad9e11
-
SHA1
b615207047889306e8bce2ad98af924390762c87
-
SHA256
b49f5ab20ed62954cee07c1a21b5f04b482becf1d7fad124a26ecc523da4490c
-
SHA512
2d548299f91aa5a26cea5ba94759e483d06a4ef490bc5931e87591beb9483903d01b2125e33f8149dce3d957d6d18d4b78964f803c067a10f4561c9396fd955d
-
SSDEEP
6144:u9X2ghurkRsgYJcTRbaUxdE+A4IMy3aAMRbBDfTK9tyXph+WvoEdSB:u9X2ghJFNE+tdY/4DfTK9sppvH0B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4192 b5fac17dfc00e5e1bb1549b7f8ad9e11.exe -
Executes dropped EXE 1 IoCs
pid Process 4192 b5fac17dfc00e5e1bb1549b7f8ad9e11.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 7 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1228 b5fac17dfc00e5e1bb1549b7f8ad9e11.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1228 b5fac17dfc00e5e1bb1549b7f8ad9e11.exe 4192 b5fac17dfc00e5e1bb1549b7f8ad9e11.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1228 wrote to memory of 4192 1228 b5fac17dfc00e5e1bb1549b7f8ad9e11.exe 90 PID 1228 wrote to memory of 4192 1228 b5fac17dfc00e5e1bb1549b7f8ad9e11.exe 90 PID 1228 wrote to memory of 4192 1228 b5fac17dfc00e5e1bb1549b7f8ad9e11.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5fac17dfc00e5e1bb1549b7f8ad9e11.exe"C:\Users\Admin\AppData\Local\Temp\b5fac17dfc00e5e1bb1549b7f8ad9e11.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\b5fac17dfc00e5e1bb1549b7f8ad9e11.exeC:\Users\Admin\AppData\Local\Temp\b5fac17dfc00e5e1bb1549b7f8ad9e11.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD52aff6841c0fa883f802b6e97652e2858
SHA1573a224b6462d9ff40d0393979423c1d9a4e7eb1
SHA256801bf1ebea09a5a73e200308f31bf4736fcf1605a8778b169b1747000f1f0b76
SHA512746185efd4616111f3967570fa34487ef3489b7c6ded94d2edc860a806bb3936eea1fdc545099c84af5d93d76b44cd22e5f7a7999ef249c982b3c881d4d58b65