Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13/09/2022, 17:50
Behavioral task
behavioral1
Sample
eb7c350d1a43a8af985e8daba7add09a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb7c350d1a43a8af985e8daba7add09a.exe
Resource
win10v2004-20220812-en
General
-
Target
eb7c350d1a43a8af985e8daba7add09a.exe
-
Size
348KB
-
MD5
eb7c350d1a43a8af985e8daba7add09a
-
SHA1
1f73832140e0520f9e6c84c6930ed0b4f2e1f43e
-
SHA256
e5527ba4613d78e45884b5808a809cd904e5199f485536aafe4634220f04027f
-
SHA512
af36e040dcd972e11c6d274c856abcd24bd708cca05c047489cbb0d35eed3e55db43562778c00243775983323d450ca1c7cf5541b1c3ef0f5ac114399348a64d
-
SSDEEP
6144:6bslI7rAzZV2MYORe5V9bZncY1xH1yVQhAyPlq/Y:6bvrkEMtqZD1yVQhAyPlq/Y
Malware Config
Signatures
-
icexloader
IceXLoader is a downloader used to deliver other malware families.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1744 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1744 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2028 1648 eb7c350d1a43a8af985e8daba7add09a.exe 28 PID 1648 wrote to memory of 2028 1648 eb7c350d1a43a8af985e8daba7add09a.exe 28 PID 1648 wrote to memory of 2028 1648 eb7c350d1a43a8af985e8daba7add09a.exe 28 PID 1648 wrote to memory of 2028 1648 eb7c350d1a43a8af985e8daba7add09a.exe 28 PID 2028 wrote to memory of 1744 2028 cmd.exe 30 PID 2028 wrote to memory of 1744 2028 cmd.exe 30 PID 2028 wrote to memory of 1744 2028 cmd.exe 30 PID 2028 wrote to memory of 1744 2028 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb7c350d1a43a8af985e8daba7add09a.exe"C:\Users\Admin\AppData\Local\Temp\eb7c350d1a43a8af985e8daba7add09a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\file.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219B
MD5f290b0832e7d0bbaba2e292943f95918
SHA15823ddb6681b7b6daa3c18c79b728c1c9dea3b42
SHA25650f4b3965252b84a58afcdbd425e2162477947d067d5c36adc5a249f37bd8103
SHA512df3128dc0c16fefebb1397668a5c7deb861d4d1ffe545172e1d39eba16aff6f4e3d068d149fda88306fab881d7438eda5c9f6d565c31594615b6ec1d6e88b707