Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 01:11
Static task
static1
Behavioral task
behavioral1
Sample
633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe
Resource
win10v2004-20220812-en
General
-
Target
633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe
-
Size
2.0MB
-
MD5
65790c132b9be132b3ef592ccb57c720
-
SHA1
bd6265715b57c7b25cba5a4daa82c2150b467e49
-
SHA256
633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560
-
SHA512
09ab14b4738dd6e70511b71965bf831de951ec66294efaee7149655687ceaac9683860f919fc5100b5bc1ffb79725925503bd9c293510853ca0bfe2c4760f6da
-
SSDEEP
24576:GKB58mnEzeDI4SY2SNxSuYPveP2HSC5Y+1YhL7:bqmEBoFP2y1+1
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 952 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 1088 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 1020 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 828 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 672 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1736 wrote to memory of 952 1736 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 28 PID 1736 wrote to memory of 952 1736 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 28 PID 1736 wrote to memory of 952 1736 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 28 PID 1736 wrote to memory of 952 1736 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 28 PID 952 wrote to memory of 1088 952 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 29 PID 952 wrote to memory of 1088 952 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 29 PID 952 wrote to memory of 1088 952 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 29 PID 952 wrote to memory of 1088 952 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 29 PID 1088 wrote to memory of 1020 1088 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 30 PID 1088 wrote to memory of 1020 1088 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 30 PID 1088 wrote to memory of 1020 1088 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 30 PID 1088 wrote to memory of 1020 1088 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 30 PID 1020 wrote to memory of 828 1020 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 31 PID 1020 wrote to memory of 828 1020 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 31 PID 1020 wrote to memory of 828 1020 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 31 PID 1020 wrote to memory of 828 1020 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 31 PID 828 wrote to memory of 672 828 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 32 PID 828 wrote to memory of 672 828 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 32 PID 828 wrote to memory of 672 828 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 32 PID 828 wrote to memory of 672 828 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 32 PID 672 wrote to memory of 996 672 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 33 PID 672 wrote to memory of 996 672 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 33 PID 672 wrote to memory of 996 672 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 33 PID 672 wrote to memory of 996 672 633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe"C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe M2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe M3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe M4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe M5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe M6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe M7⤵PID:996
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD5819667bee16383a63bfd1d991ebc2d44
SHA1824857c23f66305fd7fde5e00c7b654ccacb867d
SHA2566b16b702554e46e42af9f13449dc0daf0f3b470da2e1b1fbac0f6447173f0406
SHA51270bb96960140a254c99618c17dfe2e89d70261f8c1a623ed6c4b5588b11ea8d81514e13e4a3b8394e160c9e73aebe959daa6039c7cbf16cb35b2a403bc2abb5b
-
Filesize
126B
MD5732a5820cb83a3daf0d7182bce512267
SHA1ba54f168c09a21f7dada2056daf84ea0e0ac23d0
SHA256fd9febc4dad51b898ed33955c09eaa74edcb748b204fb8b51ec0f992746ca7f1
SHA5129ada0cbb420da63c9fb390ce365086db9c147703bc5a46a311a502989f7a721955412acf548275a76b5ff74d4fe35b9e00e66b0c646312a8be908ee106a00383
-
Filesize
168B
MD51da0a9e6f14b4076f8e9c782dac14789
SHA119081892be08ba0bca40e8522b6b97e05090bdc8
SHA256c14039aa26edda98a74a1a90680194ffb37cd18fe0e7ea019db1f9efce3707ac
SHA51215632b90f29f3d28457fe79332204dd74020fd713bc44d49fc744030fb3b42a63ec853ce07e48e3753fafa4d8c59bc98c629973039aa9a38b69c623dc2f6b896
-
Filesize
210B
MD5d65c8856103f9842974280f139f64fcb
SHA1389c79267dcd3358f7ce5ed27af62287882cba46
SHA2560bd45c7e3ef1ffb51151340e9b145d5732a3568c28a9c29fddf0cf39209c11eb
SHA51272b62d0a11e50111fc80e397bab44967b4d80e86f8d16d268438bd96a2f789206cc61118642160b533f3d066e8116cb8d0830dc4d14885c03da9ebff7d2ea569
-
Filesize
252B
MD5944c563d17cc53fc75fd761661aafe38
SHA1a0683ad4a104d3099d8041b9c30cc25b0f7b6d94
SHA256c797327dfb9cf2cc49fadfc86fab72874bbb37e135698e64a1423380c6464c66
SHA5125a0830163801e47b26ddf61bf78ae7bf868cd7b190ae5d58a105e38eac0ba785e397c58334d031c4355bf248ee747692bf702cfc019c33f4aed12a854edba1bd