Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe
Resource
win10v2004-20220901-en
General
-
Target
76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe
-
Size
1021KB
-
MD5
3cc0d0740491861616c3a6a0a728e2e6
-
SHA1
402011eadfbdc2440cfee0783d76a2499f004c83
-
SHA256
76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273
-
SHA512
5f6c4b4348e83e3cf55f6ed502802b6e5464fe289abb35ff27ddc2869f19b34c11619145188ae859d323e4d1143f36a54eefc79f2e7cae45179fa02888aaff85
-
SSDEEP
24576:gvmqGi12npB+mjFXOXvAkEp3W8AD/Dhd+y4lqJ8QdCYDoDNQ:gvmbi1mpB+KtdsvD/DX+y4onCYDoDK
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 952 temp1.tem 1920 temp2.tem -
Loads dropped DLL 5 IoCs
pid Process 1168 76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe 1168 76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe 1168 76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe 1168 76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe 1168 76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1168 76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe 1168 76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1168 wrote to memory of 952 1168 76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe 27 PID 1168 wrote to memory of 952 1168 76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe 27 PID 1168 wrote to memory of 952 1168 76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe 27 PID 1168 wrote to memory of 952 1168 76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe 27 PID 1168 wrote to memory of 1920 1168 76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe 28 PID 1168 wrote to memory of 1920 1168 76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe 28 PID 1168 wrote to memory of 1920 1168 76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe 28 PID 1168 wrote to memory of 1920 1168 76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe"C:\Users\Admin\AppData\Local\Temp\76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\temp1.temC:\Users\Admin\AppData\Local\Temp\temp1.tem2⤵
- Executes dropped EXE
PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\temp2.temC:\Users\Admin\AppData\Local\Temp\temp2.tem2⤵
- Executes dropped EXE
PID:1920
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD52aff65180ccd860c84c6de7877fa6b0f
SHA10dca808db5c8dd7a699fdd0765afbbe509817ce8
SHA2566c91830c440b3ce211f6b075a2db681ca51403f53f17d74b35d5d8b9340d70e3
SHA5128dcb62863954fdc45e3efc508c02b5d0ba8fdc120e5cc8a6b28a509750e406654390adc3df5b954349de6a2175783d010a2a53d532ec641217978b3331075629
-
Filesize
420KB
MD5f121f878287d20558f185006bc121bd7
SHA11291c85d9735a6f4133277e72bfb53a68c7ce0f4
SHA256b27a3c23fac022e262cec31716d744fc6dddb2224a7b6022ee4784fd55253c85
SHA512a44cf979f759d57755e2b78203c0f670e7c7ee58fac2c3aea6113b4aebcd679660398f7cbb7689c6d47246752b5926925b189406550afeca11d8ca1f84cc66c9
-
Filesize
1.1MB
MD597c8fe752e354b2945e4c593a87e4a8b
SHA103ab4c91535ecf14b13e0258f3a7be459a7957f9
SHA256820d8dd49baed0da44d42555ad361d78e068115661dce72ae6578dcdab6baead
SHA512af4492c08d6659d21ebfefe752b0d71210d2542c1788f1d2d9f86a85f01c3dd05eebf61c925e18b5e870aec7e9794e4a7050a04f4c58d90dca93324485690bcc
-
Filesize
65KB
MD52aff65180ccd860c84c6de7877fa6b0f
SHA10dca808db5c8dd7a699fdd0765afbbe509817ce8
SHA2566c91830c440b3ce211f6b075a2db681ca51403f53f17d74b35d5d8b9340d70e3
SHA5128dcb62863954fdc45e3efc508c02b5d0ba8fdc120e5cc8a6b28a509750e406654390adc3df5b954349de6a2175783d010a2a53d532ec641217978b3331075629
-
Filesize
65KB
MD52aff65180ccd860c84c6de7877fa6b0f
SHA10dca808db5c8dd7a699fdd0765afbbe509817ce8
SHA2566c91830c440b3ce211f6b075a2db681ca51403f53f17d74b35d5d8b9340d70e3
SHA5128dcb62863954fdc45e3efc508c02b5d0ba8fdc120e5cc8a6b28a509750e406654390adc3df5b954349de6a2175783d010a2a53d532ec641217978b3331075629
-
Filesize
420KB
MD5f121f878287d20558f185006bc121bd7
SHA11291c85d9735a6f4133277e72bfb53a68c7ce0f4
SHA256b27a3c23fac022e262cec31716d744fc6dddb2224a7b6022ee4784fd55253c85
SHA512a44cf979f759d57755e2b78203c0f670e7c7ee58fac2c3aea6113b4aebcd679660398f7cbb7689c6d47246752b5926925b189406550afeca11d8ca1f84cc66c9
-
Filesize
420KB
MD5f121f878287d20558f185006bc121bd7
SHA11291c85d9735a6f4133277e72bfb53a68c7ce0f4
SHA256b27a3c23fac022e262cec31716d744fc6dddb2224a7b6022ee4784fd55253c85
SHA512a44cf979f759d57755e2b78203c0f670e7c7ee58fac2c3aea6113b4aebcd679660398f7cbb7689c6d47246752b5926925b189406550afeca11d8ca1f84cc66c9