Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
de8b764b7d04475aff143fa687db78be.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de8b764b7d04475aff143fa687db78be.exe
Resource
win10v2004-20240226-en
General
-
Target
de8b764b7d04475aff143fa687db78be.exe
-
Size
385KB
-
MD5
de8b764b7d04475aff143fa687db78be
-
SHA1
b77f5b10331b0ca5617f30a07fe85efd66a49c54
-
SHA256
b90a9ac63779ea4d3ad86c2980b2837efc0ed53a3128ec05b5f6167764da0a1d
-
SHA512
a580adf97120db8ee27d62bdec30a1c6268ec820a4bdd2411aa7c742aa074a91708f74be45dd9e0013da73766ccf5a1dbbb02c623f2b874805ac8c91cddf75ff
-
SSDEEP
12288:tE4tNqNanq/TEYHshJKacSLV9G63bEjmcTB:tEeNqs8inKaJV9G++JB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4340 de8b764b7d04475aff143fa687db78be.exe -
Executes dropped EXE 1 IoCs
pid Process 4340 de8b764b7d04475aff143fa687db78be.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 11 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1988 de8b764b7d04475aff143fa687db78be.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1988 de8b764b7d04475aff143fa687db78be.exe 4340 de8b764b7d04475aff143fa687db78be.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1988 wrote to memory of 4340 1988 de8b764b7d04475aff143fa687db78be.exe 95 PID 1988 wrote to memory of 4340 1988 de8b764b7d04475aff143fa687db78be.exe 95 PID 1988 wrote to memory of 4340 1988 de8b764b7d04475aff143fa687db78be.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\de8b764b7d04475aff143fa687db78be.exe"C:\Users\Admin\AppData\Local\Temp\de8b764b7d04475aff143fa687db78be.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\de8b764b7d04475aff143fa687db78be.exeC:\Users\Admin\AppData\Local\Temp\de8b764b7d04475aff143fa687db78be.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4072 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:4480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5cf01aec852f0bcca4fb959d9ff0a97cd
SHA1c6a32768665f34b13ad124e2f67d36eb31ff90ff
SHA25634d673552940cc47d62b0d5adde0aac6404c4968aa8117b6e9281b7aab11f0d8
SHA512e6eddc5fc141d8c1aebebfc453586775d4970902a83a5be13c3c7414af11f0824190a1956d38849b045c3be1c43e64120e2b634fcfff26c4b788d55015acb8f0