Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
ba58ea6b373dd0bc59026912d4b45209.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba58ea6b373dd0bc59026912d4b45209.exe
Resource
win10v2004-20240226-en
General
-
Target
ba58ea6b373dd0bc59026912d4b45209.exe
-
Size
385KB
-
MD5
ba58ea6b373dd0bc59026912d4b45209
-
SHA1
6e7428beb862138e6f02490e82b3ab4439fa46aa
-
SHA256
e9158e8f12f9e75dcfb78474196cc9eee11702e562c07c1ebea1b1cfadea057c
-
SHA512
34e59601a3312fc730195434469620fc9359e773de3176f6cf471d3b4468ca29a1472458df493fddb6abb8d57c15b84c2b6d3ed6cd429816496b6269f5908da8
-
SSDEEP
12288:Zyx/ltGltkfWSSAFtXDpsN/5GGsbk7zSVEwE0WGNbms02fnHM4zmzptXtd0kZwHq:gx/ltGlt2W8FtXDpsN/5psqzIEwE05Fi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1776 ba58ea6b373dd0bc59026912d4b45209.exe -
Executes dropped EXE 1 IoCs
pid Process 1776 ba58ea6b373dd0bc59026912d4b45209.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 7 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2260 ba58ea6b373dd0bc59026912d4b45209.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2260 ba58ea6b373dd0bc59026912d4b45209.exe 1776 ba58ea6b373dd0bc59026912d4b45209.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1776 2260 ba58ea6b373dd0bc59026912d4b45209.exe 87 PID 2260 wrote to memory of 1776 2260 ba58ea6b373dd0bc59026912d4b45209.exe 87 PID 2260 wrote to memory of 1776 2260 ba58ea6b373dd0bc59026912d4b45209.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba58ea6b373dd0bc59026912d4b45209.exe"C:\Users\Admin\AppData\Local\Temp\ba58ea6b373dd0bc59026912d4b45209.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\ba58ea6b373dd0bc59026912d4b45209.exeC:\Users\Admin\AppData\Local\Temp\ba58ea6b373dd0bc59026912d4b45209.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5ede7ffbbf3e5e9c096ca6c897980548f
SHA1b66d66a02c9e5a5f5e1982e28213e75e4a9cd912
SHA256f3a64898b236b01ebf70bdc2471958ac21720e7f55ad6fa30b54a44c3a9f9d3e
SHA512122d585ea2cb7ed0096f9fc0499366ec1dde3aab4c0ed12313331a18c96cf9031aa117ee4e5819da78792e5adb6038d9f7b54d91ae0f9af525e4bfdd73d65b8a