Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
589e62b951ea964b3fa2c1a90249ea99476fb2b6ced69d23de009eed20060dca.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
589e62b951ea964b3fa2c1a90249ea99476fb2b6ced69d23de009eed20060dca.exe
Resource
win10v2004-20220812-en
General
-
Target
589e62b951ea964b3fa2c1a90249ea99476fb2b6ced69d23de009eed20060dca.exe
-
Size
291KB
-
MD5
6be35704c0b8a0799de248dd25a14b30
-
SHA1
a130517fb07219dbbd9fbe0142fd8d1851491251
-
SHA256
589e62b951ea964b3fa2c1a90249ea99476fb2b6ced69d23de009eed20060dca
-
SHA512
d907ff08665bf7cddeaca103d7a3748c0391df6ecefb8f842b900544da607b695f468ae4c877ea071ca43cf257df23f60fa4430bdab949b33f79f9da1d4c9d08
-
SSDEEP
6144:cJvrJVsjAre1HsOVdH+djIPyDiXKaJEI5:gvrJVKAgfNjyOXlP
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000500000000b2d2-54.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1308 589e62b951ea964b3fa2c1a90249ea99476fb2b6ced69d23de009eed20060dca.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1308 589e62b951ea964b3fa2c1a90249ea99476fb2b6ced69d23de009eed20060dca.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1204 1308 589e62b951ea964b3fa2c1a90249ea99476fb2b6ced69d23de009eed20060dca.exe 28 PID 1308 wrote to memory of 1204 1308 589e62b951ea964b3fa2c1a90249ea99476fb2b6ced69d23de009eed20060dca.exe 28 PID 1308 wrote to memory of 1204 1308 589e62b951ea964b3fa2c1a90249ea99476fb2b6ced69d23de009eed20060dca.exe 28 PID 1308 wrote to memory of 1204 1308 589e62b951ea964b3fa2c1a90249ea99476fb2b6ced69d23de009eed20060dca.exe 28 PID 1204 wrote to memory of 1692 1204 cmd.exe 29 PID 1204 wrote to memory of 1692 1204 cmd.exe 29 PID 1204 wrote to memory of 1692 1204 cmd.exe 29 PID 1204 wrote to memory of 1692 1204 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\589e62b951ea964b3fa2c1a90249ea99476fb2b6ced69d23de009eed20060dca.exe"C:\Users\Admin\AppData\Local\Temp\589e62b951ea964b3fa2c1a90249ea99476fb2b6ced69d23de009eed20060dca.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\~8C9.bat "C:\Users\Admin\AppData\Local\Temp\589e62b951ea964b3fa2c1a90249ea99476fb2b6ced69d23de009eed20060dca.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\mode.commode con: cols=35 lines=203⤵PID:1692
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD548dc87f829439faa8054031f9aa770f6
SHA1382f6c95b68c03674153bc4bbc12ec73706bb36d
SHA2562f38298c0f7f7e1f1538d6b134bbbde7f1a81f7fe457f6d7efbc6a71572f71e1
SHA512c613bb949f4e2474099308f043b163817e8de17b0598819f414de6396202b8c2df9c570b6d81b2435c136647a60790d6aeb1826388464c534997075fdd340c34
-
Filesize
172KB
MD5825bca543d5c096c50897d59ae875860
SHA11e1907d4b48d2b6e4b7ae73a4b27c9852c5cac2d
SHA256c50fd73265695efdcea2ab564e4cfff722b177058b7160b39dfe814244df17f6
SHA512861a8e5d8aa925b40170e456470f706153df22bdfb0966d27c96c4c9beff502c584e1e24f7f2c838dd3ff0de490862dbbc2a951db9347f690e1964abcc37589a