Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
c92c1fdfccc9a087683133391ae5a1d7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c92c1fdfccc9a087683133391ae5a1d7.exe
Resource
win10v2004-20240226-en
General
-
Target
c92c1fdfccc9a087683133391ae5a1d7.exe
-
Size
385KB
-
MD5
c92c1fdfccc9a087683133391ae5a1d7
-
SHA1
a426a8a0b5cde14428861a9a8a83c7706180f4e9
-
SHA256
9096961f2304c80a123b9bcc4666e4c330b237a44683ac3bca07da3bd2da77da
-
SHA512
86a0100aab3c8e2835fa8eb074edf9ecba3b07ef7ae37d0ce6943bd2e41b89519098b4707249df60dc74b414a034a9493f623ad30777b3ace7dadd5c44474608
-
SSDEEP
12288:Km58+z+bdYslhcnJXcMuW8fbBeiXON1QpYZY6XH/JEnQNFMxhw6zUzteIvTWdQqt:KmdhmiQrB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 876 c92c1fdfccc9a087683133391ae5a1d7.exe -
Executes dropped EXE 1 IoCs
pid Process 876 c92c1fdfccc9a087683133391ae5a1d7.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1092 c92c1fdfccc9a087683133391ae5a1d7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1092 c92c1fdfccc9a087683133391ae5a1d7.exe 876 c92c1fdfccc9a087683133391ae5a1d7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1092 wrote to memory of 876 1092 c92c1fdfccc9a087683133391ae5a1d7.exe 88 PID 1092 wrote to memory of 876 1092 c92c1fdfccc9a087683133391ae5a1d7.exe 88 PID 1092 wrote to memory of 876 1092 c92c1fdfccc9a087683133391ae5a1d7.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c92c1fdfccc9a087683133391ae5a1d7.exe"C:\Users\Admin\AppData\Local\Temp\c92c1fdfccc9a087683133391ae5a1d7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\c92c1fdfccc9a087683133391ae5a1d7.exeC:\Users\Admin\AppData\Local\Temp\c92c1fdfccc9a087683133391ae5a1d7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD595c22757b7f28f67af3a59701225bcee
SHA12f268e90305efebaf5554937dface2820dad9b1f
SHA2568660bd0871151ea06a749b964f124f322f40dae95b906d49b970d35cb42c403e
SHA51267f205dd48ba78307e437be62b3c6952e4db99612b0fbdf9da2a8e841fbc727056e65e8446b1511ea5ddaa98aa676882b31229d423ccc3ded51eb2a2a38a3a7e