Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
ca17140569ce2ef4409f84fc805ffc91.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ca17140569ce2ef4409f84fc805ffc91.exe
Resource
win10v2004-20240226-en
General
-
Target
ca17140569ce2ef4409f84fc805ffc91.exe
-
Size
385KB
-
MD5
ca17140569ce2ef4409f84fc805ffc91
-
SHA1
fe3365fcbe3180e78dd6ffd9b1cb9853a7633ed3
-
SHA256
55c12b56977405f3fabdc0d66b975ec1358dcbad0eb6582a4f35d6db3b962899
-
SHA512
87345ff1c8e97e00602b69cdb0e5279419391e1525bb72999479b9401da838afff43fcfd2aae64b6dffbf832998d27ac8823d2e75b334db197acd11011d6521a
-
SSDEEP
12288:qHYjdRVWOSDvCdxJ0imYitmUUx10OkIn6B:qH2XUxsxiiM4txGo6B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4976 ca17140569ce2ef4409f84fc805ffc91.exe -
Executes dropped EXE 1 IoCs
pid Process 4976 ca17140569ce2ef4409f84fc805ffc91.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 19 pastebin.com 18 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3024 ca17140569ce2ef4409f84fc805ffc91.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3024 ca17140569ce2ef4409f84fc805ffc91.exe 4976 ca17140569ce2ef4409f84fc805ffc91.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3024 wrote to memory of 4976 3024 ca17140569ce2ef4409f84fc805ffc91.exe 88 PID 3024 wrote to memory of 4976 3024 ca17140569ce2ef4409f84fc805ffc91.exe 88 PID 3024 wrote to memory of 4976 3024 ca17140569ce2ef4409f84fc805ffc91.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca17140569ce2ef4409f84fc805ffc91.exe"C:\Users\Admin\AppData\Local\Temp\ca17140569ce2ef4409f84fc805ffc91.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\ca17140569ce2ef4409f84fc805ffc91.exeC:\Users\Admin\AppData\Local\Temp\ca17140569ce2ef4409f84fc805ffc91.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD50a87af4b97935e1d2b7a4e55907f9806
SHA145ac29de580fcd10dcf99abfaad1c86a087121c7
SHA256f10aab8ea77250adfbb0fddb60a7799a35ef1d7ec573fba47b3c010e60ddf775
SHA512c91d87a0bb33380edceaad3d4f37396f47196741916c2086be7e39a611f0cb0ad3791ae5411a6bf44eb7881802f35ee69347a7eb028fda3a0afd9bdb3c50012a