Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 06:15
Static task
static1
Behavioral task
behavioral1
Sample
c00ec202a7fa4fa12808b7f2958ddc95.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c00ec202a7fa4fa12808b7f2958ddc95.exe
Resource
win10v2004-20240226-en
General
-
Target
c00ec202a7fa4fa12808b7f2958ddc95.exe
-
Size
771KB
-
MD5
c00ec202a7fa4fa12808b7f2958ddc95
-
SHA1
ddc3121524b3dcee95ba3e0739f09a84a79e7852
-
SHA256
22e1ceb02a7e5a4157a8b84563a72240a8d0279d6c48599770e3918eba608b66
-
SHA512
f88abdb1576751e55f572b6ee1e9d3a69f2366b47787748f73c5d7fc9ed9f295836eba485e09d829a5ea49d15fe50e5bf14a764b313a34167c2e145dbcd55598
-
SSDEEP
12288:37Yd9rxf6HZrqR61PYrKyjazHMPzJLniYZ/C9OFEIif0F6rerfrEhU8zFVMB:37Yd9Nur/YmyjustvZWqEIz6qrfiTMB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5096 c00ec202a7fa4fa12808b7f2958ddc95.exe -
Executes dropped EXE 1 IoCs
pid Process 5096 c00ec202a7fa4fa12808b7f2958ddc95.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 32 pastebin.com 33 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3968 c00ec202a7fa4fa12808b7f2958ddc95.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3968 c00ec202a7fa4fa12808b7f2958ddc95.exe 5096 c00ec202a7fa4fa12808b7f2958ddc95.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3968 wrote to memory of 5096 3968 c00ec202a7fa4fa12808b7f2958ddc95.exe 96 PID 3968 wrote to memory of 5096 3968 c00ec202a7fa4fa12808b7f2958ddc95.exe 96 PID 3968 wrote to memory of 5096 3968 c00ec202a7fa4fa12808b7f2958ddc95.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\c00ec202a7fa4fa12808b7f2958ddc95.exe"C:\Users\Admin\AppData\Local\Temp\c00ec202a7fa4fa12808b7f2958ddc95.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\c00ec202a7fa4fa12808b7f2958ddc95.exeC:\Users\Admin\AppData\Local\Temp\c00ec202a7fa4fa12808b7f2958ddc95.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3932 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD5de3f2b739e6fe84095d50d0c4aa0b3af
SHA17cdcf6234a006894efcf54c027ddffc22810bacb
SHA256dd9dddd360ad646fa9d247ad1b4c57cf3416c39670cdcf5997e05277bdf943fe
SHA5127f3fc199a3ae6c8d4fe51f2c45254e2c546e7b9fede5ba1c5989a218f57082f65c9bac9230b76b74cf6d087e608008456a342ee60e9b89e86306d24ce3729cf3