Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 21:49
Static task
static1
Behavioral task
behavioral1
Sample
9dc185fb9d2657bab53605d9ced355812856d130c01308230febf1c4b41612c6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9dc185fb9d2657bab53605d9ced355812856d130c01308230febf1c4b41612c6.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
9dc185fb9d2657bab53605d9ced355812856d130c01308230febf1c4b41612c6.exe
-
Size
152KB
-
MD5
39dc0f12f0314fd8ca114ea7a999ba00
-
SHA1
4acc211d16b40631a37d088225a7d522e61da189
-
SHA256
9dc185fb9d2657bab53605d9ced355812856d130c01308230febf1c4b41612c6
-
SHA512
a8527e94477a8c15792de09c7295ca9f9599ba7dcc706ea1ccaebae5489c8605e4031197d4ff0c8ef06a1581bf60c4e203b80f8ee889424bbcb09086c1b1b804
-
SSDEEP
1536:cmme3awIFmATtceLiJ/0nJBL8vEi8jMSRPLShVuy5IyjFyecdSj:+eNIMStceLuGb83RHuynjFydUj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 820 TVCwxu.tmp -
Loads dropped DLL 2 IoCs
pid Process 1376 9dc185fb9d2657bab53605d9ced355812856d130c01308230febf1c4b41612c6.exe 1376 9dc185fb9d2657bab53605d9ced355812856d130c01308230febf1c4b41612c6.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1376 9dc185fb9d2657bab53605d9ced355812856d130c01308230febf1c4b41612c6.exe 820 TVCwxu.tmp 820 TVCwxu.tmp -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1376 9dc185fb9d2657bab53605d9ced355812856d130c01308230febf1c4b41612c6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1376 wrote to memory of 820 1376 9dc185fb9d2657bab53605d9ced355812856d130c01308230febf1c4b41612c6.exe 26 PID 1376 wrote to memory of 820 1376 9dc185fb9d2657bab53605d9ced355812856d130c01308230febf1c4b41612c6.exe 26 PID 1376 wrote to memory of 820 1376 9dc185fb9d2657bab53605d9ced355812856d130c01308230febf1c4b41612c6.exe 26 PID 1376 wrote to memory of 820 1376 9dc185fb9d2657bab53605d9ced355812856d130c01308230febf1c4b41612c6.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\9dc185fb9d2657bab53605d9ced355812856d130c01308230febf1c4b41612c6.exe"C:\Users\Admin\AppData\Local\Temp\9dc185fb9d2657bab53605d9ced355812856d130c01308230febf1c4b41612c6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Public\Videos\TVCwxu.tmp"C:\Users\Public\Videos\TVCwxu.tmp"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:820
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD50289e0791ab7b1d28bf07014be1a98e5
SHA157cfec4862dd3ab962cc86579223872453edf5f0
SHA2568dcc47c93617b5e3a180e72dbc34e8c05d61c473b6c888cfae65020cb220dba4
SHA512b385833cb3965fbb7d92b2beb9da2c1687b8fabc4dd026fdd2766bf3f507af3d434f5b5401df3ecd4cd0fafbb72507f694c4098e90f56a4fe2de01556fba3139
-
Filesize
100KB
MD50289e0791ab7b1d28bf07014be1a98e5
SHA157cfec4862dd3ab962cc86579223872453edf5f0
SHA2568dcc47c93617b5e3a180e72dbc34e8c05d61c473b6c888cfae65020cb220dba4
SHA512b385833cb3965fbb7d92b2beb9da2c1687b8fabc4dd026fdd2766bf3f507af3d434f5b5401df3ecd4cd0fafbb72507f694c4098e90f56a4fe2de01556fba3139
-
Filesize
100KB
MD50289e0791ab7b1d28bf07014be1a98e5
SHA157cfec4862dd3ab962cc86579223872453edf5f0
SHA2568dcc47c93617b5e3a180e72dbc34e8c05d61c473b6c888cfae65020cb220dba4
SHA512b385833cb3965fbb7d92b2beb9da2c1687b8fabc4dd026fdd2766bf3f507af3d434f5b5401df3ecd4cd0fafbb72507f694c4098e90f56a4fe2de01556fba3139