Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
c3ee4ad0f714597a8f1da85c231a762d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3ee4ad0f714597a8f1da85c231a762d.exe
Resource
win10v2004-20240226-en
General
-
Target
c3ee4ad0f714597a8f1da85c231a762d.exe
-
Size
385KB
-
MD5
c3ee4ad0f714597a8f1da85c231a762d
-
SHA1
5a681d8e0a7592f58d3357375162e978c706f3e4
-
SHA256
8fc4c74a5e4a423371050cbb30b21a5d32864bdbcac0330dc664b20d37c37a96
-
SHA512
00d5419d3e30e4f53ca60bd98d3c213bc508fe7d9ef993678e95ea80958ed7a6e00d13d726f156b02f8650b931a3d034aa6ab6484a54d7bebe26354ec7d3673f
-
SSDEEP
12288:IK16W/aRy4hExAY97gAKJyxwFlAH3XLoCjwB:IK//G8Z75lLoCcB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1452 c3ee4ad0f714597a8f1da85c231a762d.exe -
Executes dropped EXE 1 IoCs
pid Process 1452 c3ee4ad0f714597a8f1da85c231a762d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 29 pastebin.com 31 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1256 c3ee4ad0f714597a8f1da85c231a762d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1256 c3ee4ad0f714597a8f1da85c231a762d.exe 1452 c3ee4ad0f714597a8f1da85c231a762d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1452 1256 c3ee4ad0f714597a8f1da85c231a762d.exe 99 PID 1256 wrote to memory of 1452 1256 c3ee4ad0f714597a8f1da85c231a762d.exe 99 PID 1256 wrote to memory of 1452 1256 c3ee4ad0f714597a8f1da85c231a762d.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3ee4ad0f714597a8f1da85c231a762d.exe"C:\Users\Admin\AppData\Local\Temp\c3ee4ad0f714597a8f1da85c231a762d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\c3ee4ad0f714597a8f1da85c231a762d.exeC:\Users\Admin\AppData\Local\Temp\c3ee4ad0f714597a8f1da85c231a762d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3592 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:4220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5a4936733c8ac65d48ebe2ffa503e1ab7
SHA1bef2d839451064127e886996fdf0e5dc40454936
SHA25645c0c54b3b626b9f49cf79150c2b3e92fb9febba303512c50f4bf7298bf1dbae
SHA5122d35b78fc991513834ae7dc14867deb219d17aa09c12f3534cbb708a875948f9736218bb16a482ebbb7da003717af2980ed72f2adc1d5ba5d4c929529439b1f2