Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
a5e1cd59be9eea588b77b6361e45fa4a4b292c10885dfb31143659263f0b04c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a5e1cd59be9eea588b77b6361e45fa4a4b292c10885dfb31143659263f0b04c5.exe
Resource
win10v2004-20220901-en
General
-
Target
a5e1cd59be9eea588b77b6361e45fa4a4b292c10885dfb31143659263f0b04c5.exe
-
Size
15KB
-
MD5
347c7dec82ea6a1013a53f6511e60e16
-
SHA1
aa0159f8cd0eff34843dccaca4479e4958891e26
-
SHA256
a5e1cd59be9eea588b77b6361e45fa4a4b292c10885dfb31143659263f0b04c5
-
SHA512
ccc5433e45e91415a3767bcd95840a104d6249d4e9473704fdab487d9df76cc7e003fc1e87081326fafb89cfc618f3767d38fd2a4d308f8077c5d1876a860891
-
SSDEEP
384:IwFIaBq7b2No1b5o7IctZFOCNxcTCND1QMw+cL0i:IwBB2x3S7xcOw+n
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1052 cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1052 1424 a5e1cd59be9eea588b77b6361e45fa4a4b292c10885dfb31143659263f0b04c5.exe 26 PID 1424 wrote to memory of 1052 1424 a5e1cd59be9eea588b77b6361e45fa4a4b292c10885dfb31143659263f0b04c5.exe 26 PID 1424 wrote to memory of 1052 1424 a5e1cd59be9eea588b77b6361e45fa4a4b292c10885dfb31143659263f0b04c5.exe 26 PID 1424 wrote to memory of 1052 1424 a5e1cd59be9eea588b77b6361e45fa4a4b292c10885dfb31143659263f0b04c5.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5e1cd59be9eea588b77b6361e45fa4a4b292c10885dfb31143659263f0b04c5.exe"C:\Users\Admin\AppData\Local\Temp\a5e1cd59be9eea588b77b6361e45fa4a4b292c10885dfb31143659263f0b04c5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a5e1cd59be9eea588b77b6361e45fa4a4b292c10885dfb31143659263f0b04c5.bat"2⤵
- Deletes itself
PID:1052
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\a5e1cd59be9eea588b77b6361e45fa4a4b292c10885dfb31143659263f0b04c5.bat
Filesize361B
MD5752909e1b0a16280de189bf6760741ae
SHA1d3635abdcef0972e72a7f88223c949640121009b
SHA256748337efd9dc587f83cbaa8c0b643b209ab20ffa5c01857a611334c55c97bbf0
SHA512c5cd0eeec3eba080956c63f41b7a8414797eb88cbc38f5de21668cc4210be7d45eef07324fac78b2c2c99ebd2f6a0139216c41482e3cb53f6395f5780b332e55