Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
b8ca888dc952a15e60c707d45100baaf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8ca888dc952a15e60c707d45100baaf.exe
Resource
win10v2004-20240226-en
General
-
Target
b8ca888dc952a15e60c707d45100baaf.exe
-
Size
385KB
-
MD5
b8ca888dc952a15e60c707d45100baaf
-
SHA1
1c1951271bdb44810c05b2b021ecd6aab28e2560
-
SHA256
ba7213941d57e1d2385c9b310d3188fe1f7384d9bbd649cb7aa9cfb2885021f8
-
SHA512
47b681846c9c59c54ec930f486ac1215654675fbc43a8c3651852c02c52b619853939360c2cc15237d84f52baa097da9606fdab1bc379cf950f08133e4ed4c54
-
SSDEEP
12288:RZR9j8b5EEHG9kUrVleKAT6QDViCAQfgC8B:jR94+Osz1yDViCAoV8B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1664 b8ca888dc952a15e60c707d45100baaf.exe -
Executes dropped EXE 1 IoCs
pid Process 1664 b8ca888dc952a15e60c707d45100baaf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 10 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 212 b8ca888dc952a15e60c707d45100baaf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 212 b8ca888dc952a15e60c707d45100baaf.exe 1664 b8ca888dc952a15e60c707d45100baaf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 212 wrote to memory of 1664 212 b8ca888dc952a15e60c707d45100baaf.exe 89 PID 212 wrote to memory of 1664 212 b8ca888dc952a15e60c707d45100baaf.exe 89 PID 212 wrote to memory of 1664 212 b8ca888dc952a15e60c707d45100baaf.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8ca888dc952a15e60c707d45100baaf.exe"C:\Users\Admin\AppData\Local\Temp\b8ca888dc952a15e60c707d45100baaf.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\b8ca888dc952a15e60c707d45100baaf.exeC:\Users\Admin\AppData\Local\Temp\b8ca888dc952a15e60c707d45100baaf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD544f13a314d9a37468004b462448bf82b
SHA1aa30b92a1bbc83b9d0b2289ad07dbe7ab0f7d82d
SHA2566fbac1d032ed8b6086c090a8eb367f1af0caaec985936a20c0e39b5548dd7a76
SHA5125fcb639b0092072af77b1668ce29c1cc43679a7c6460c279d963ba5488a2f84cdfe1ede00d117d49de9172cad3f222c3c5140b3abf8d8bbe9af49fd40bdf8c04