Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
b43a17525c1e596eb0bf6ca9bfdb29b0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b43a17525c1e596eb0bf6ca9bfdb29b0.exe
Resource
win10v2004-20240226-en
General
-
Target
b43a17525c1e596eb0bf6ca9bfdb29b0.exe
-
Size
771KB
-
MD5
b43a17525c1e596eb0bf6ca9bfdb29b0
-
SHA1
9876051af95d5680ac8cae0f75e9ea24963d371e
-
SHA256
7ae1875e7574319075cc3db0cca308804ba47781b5ed51b32ed7fde33e0e8608
-
SHA512
7347b4e616b3e6ce1db7767347f43b665bbfee52ad87112e474bd98045d6460aa1e68a1804a2edd23b86cf6172c61ac013538f342cb3c84797047380a135f26a
-
SSDEEP
12288:p9ykDyKzATe9WEJrFA//ZwqfPzJLniYZ/C9OFEIif0F6rerfrEhU8zFVMB:LZDdzIwXA3pftvZWqEIz6qrfiTMB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4772 b43a17525c1e596eb0bf6ca9bfdb29b0.exe -
Executes dropped EXE 1 IoCs
pid Process 4772 b43a17525c1e596eb0bf6ca9bfdb29b0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 pastebin.com 13 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2264 b43a17525c1e596eb0bf6ca9bfdb29b0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2264 b43a17525c1e596eb0bf6ca9bfdb29b0.exe 4772 b43a17525c1e596eb0bf6ca9bfdb29b0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2264 wrote to memory of 4772 2264 b43a17525c1e596eb0bf6ca9bfdb29b0.exe 89 PID 2264 wrote to memory of 4772 2264 b43a17525c1e596eb0bf6ca9bfdb29b0.exe 89 PID 2264 wrote to memory of 4772 2264 b43a17525c1e596eb0bf6ca9bfdb29b0.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b43a17525c1e596eb0bf6ca9bfdb29b0.exe"C:\Users\Admin\AppData\Local\Temp\b43a17525c1e596eb0bf6ca9bfdb29b0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\b43a17525c1e596eb0bf6ca9bfdb29b0.exeC:\Users\Admin\AppData\Local\Temp\b43a17525c1e596eb0bf6ca9bfdb29b0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD5b5ecb05817c11ce0503e33f9918e4ce7
SHA14a04f4379fdc98f2732fc666996262bfac502fa4
SHA2566e7622e55fdb5ed546f4d0036f9e64360e29bcf1a958cc3df17826fb182d034a
SHA512a6c662424290dc2f6be07572013abae098e41cf30475b8dc7d0aa6872eea644c3582d3370b99f74258716b5835a25f5427940ca85367801d6574e778f48e23c5