Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
164s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
df3b9490e67ed0bc6d3b2dc7dfeeb06b.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
df3b9490e67ed0bc6d3b2dc7dfeeb06b.exe
Resource
win10v2004-20240226-en
General
-
Target
df3b9490e67ed0bc6d3b2dc7dfeeb06b.exe
-
Size
385KB
-
MD5
df3b9490e67ed0bc6d3b2dc7dfeeb06b
-
SHA1
a7d6ef316f36b2752d74c34323b70e44fafadc78
-
SHA256
32eb2e3a1ec6b081d9c6fcfa52caf41e81b0b55dd7372d0caa39ecfd42f837e2
-
SHA512
3622e010fbe80e947678e415e61f022925eebf5392cc818f1a47604f2075432ebcc4fa784d7c9d2f1367d6b7f54b61cb6c94b70bf1b91aee1088a4c77da2ebcd
-
SSDEEP
12288:NdCwIxTCG/XBV5rKQroUIxrNW9TeHONzC9s/B:No7ZXB/KQroUI6TecR/B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4712 df3b9490e67ed0bc6d3b2dc7dfeeb06b.exe -
Executes dropped EXE 1 IoCs
pid Process 4712 df3b9490e67ed0bc6d3b2dc7dfeeb06b.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 pastebin.com 11 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4880 df3b9490e67ed0bc6d3b2dc7dfeeb06b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4880 df3b9490e67ed0bc6d3b2dc7dfeeb06b.exe 4712 df3b9490e67ed0bc6d3b2dc7dfeeb06b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4880 wrote to memory of 4712 4880 df3b9490e67ed0bc6d3b2dc7dfeeb06b.exe 96 PID 4880 wrote to memory of 4712 4880 df3b9490e67ed0bc6d3b2dc7dfeeb06b.exe 96 PID 4880 wrote to memory of 4712 4880 df3b9490e67ed0bc6d3b2dc7dfeeb06b.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\df3b9490e67ed0bc6d3b2dc7dfeeb06b.exe"C:\Users\Admin\AppData\Local\Temp\df3b9490e67ed0bc6d3b2dc7dfeeb06b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\df3b9490e67ed0bc6d3b2dc7dfeeb06b.exeC:\Users\Admin\AppData\Local\Temp\df3b9490e67ed0bc6d3b2dc7dfeeb06b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=2700,i,14629483171127516024,12350888228055326066,262144 --variations-seed-version /prefetch:81⤵PID:3756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD54093489ac7f77b10815b87537496ab52
SHA19f18bb13bbabb8b3a15456096c778e91cb2d14f4
SHA256c2adaf00914187e86b77c789167c8340bf1b0faacbdd0094e18faf7aceff6a0d
SHA51260e925e0429535d7c26ecaa27cce12f6f04a8829ca0168f4f4c81b55e1d6666342addb0b8c8f8eee90c49b53423d3d0bfa58aaccb88afb841c8d2399f00ab604