Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22/09/2022, 08:37
Static task
static1
Behavioral task
behavioral1
Sample
58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe
Resource
win10v2004-20220812-en
General
-
Target
58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe
-
Size
15.5MB
-
MD5
993ed0ba6ae77c1b561d724edc1d45de
-
SHA1
4dc43a9b3c5cb4b8a840bd5d791863d651f876cd
-
SHA256
58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606
-
SHA512
b684716c4415e8bb347f17e6df1bae7a60d625446177f8c961c7b57602663e644d53c355ae1eaac91a5d568fdd144c8501fc1cd1a830c822e56e4b503cb8288f
-
SSDEEP
393216:fqr7HXo//aspgFN4g6LCsOzPRtYm9o5/8iEKDsplelrJoW+1DJLmiHtSez7:yfH4a14vCRz3Ym94NE2PP+1DwTi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1732 58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.tmp -
Loads dropped DLL 3 IoCs
pid Process 1080 58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe 1732 58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.tmp 1732 58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1080 wrote to memory of 1732 1080 58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe 28 PID 1080 wrote to memory of 1732 1080 58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe 28 PID 1080 wrote to memory of 1732 1080 58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe 28 PID 1080 wrote to memory of 1732 1080 58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe"C:\Users\Admin\AppData\Local\Temp\58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\is-D8A56.tmp\58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.tmp"C:\Users\Admin\AppData\Local\Temp\is-D8A56.tmp\58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.tmp" /SL5="$60120,15899800,114176,C:\Users\Admin\AppData\Local\Temp\58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1732
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-D8A56.tmp\58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.tmp
Filesize1.1MB
MD54b6d752df7add5d5e17f6bfd9c21ee4c
SHA1064b201a03ce836248e0c3b25064389d6ceb36f3
SHA256e314bea833e7b27c4ce59e212add98da81bc1a56b795089133530289a915583a
SHA512dd188de2ce9a4b6bbbeaffe02f00ffdf381389d409b3fe532db3a710dd307edbdef3c1e7a3702909957481e68df965726fb317f5fc7e2ddb08d647654e672e51
-
\Users\Admin\AppData\Local\Temp\is-D8A56.tmp\58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.tmp
Filesize1.1MB
MD54b6d752df7add5d5e17f6bfd9c21ee4c
SHA1064b201a03ce836248e0c3b25064389d6ceb36f3
SHA256e314bea833e7b27c4ce59e212add98da81bc1a56b795089133530289a915583a
SHA512dd188de2ce9a4b6bbbeaffe02f00ffdf381389d409b3fe532db3a710dd307edbdef3c1e7a3702909957481e68df965726fb317f5fc7e2ddb08d647654e672e51
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3