Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 01:11

General

  • Target

    633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe

  • Size

    2.0MB

  • MD5

    65790c132b9be132b3ef592ccb57c720

  • SHA1

    bd6265715b57c7b25cba5a4daa82c2150b467e49

  • SHA256

    633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560

  • SHA512

    09ab14b4738dd6e70511b71965bf831de951ec66294efaee7149655687ceaac9683860f919fc5100b5bc1ffb79725925503bd9c293510853ca0bfe2c4760f6da

  • SSDEEP

    24576:GKB58mnEzeDI4SY2SNxSuYPveP2HSC5Y+1YhL7:bqmEBoFP2y1+1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe
    "C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe
      633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe M
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:952
      • C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe
        633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe M
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1088
        • C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe
          633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe M
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1020
          • C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe
            633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe M
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:828
            • C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe
              633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe M
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:672
              • C:\Users\Admin\AppData\Local\Temp\633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe
                633fab8d11eda81bd6ad49861f1720e858b354d13ecad308e309d2a4b5235560.exe M
                7⤵
                  PID:996

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Log\log.txt

      Filesize

      84B

      MD5

      819667bee16383a63bfd1d991ebc2d44

      SHA1

      824857c23f66305fd7fde5e00c7b654ccacb867d

      SHA256

      6b16b702554e46e42af9f13449dc0daf0f3b470da2e1b1fbac0f6447173f0406

      SHA512

      70bb96960140a254c99618c17dfe2e89d70261f8c1a623ed6c4b5588b11ea8d81514e13e4a3b8394e160c9e73aebe959daa6039c7cbf16cb35b2a403bc2abb5b

    • C:\Users\Admin\AppData\Local\Temp\Log\log.txt

      Filesize

      126B

      MD5

      732a5820cb83a3daf0d7182bce512267

      SHA1

      ba54f168c09a21f7dada2056daf84ea0e0ac23d0

      SHA256

      fd9febc4dad51b898ed33955c09eaa74edcb748b204fb8b51ec0f992746ca7f1

      SHA512

      9ada0cbb420da63c9fb390ce365086db9c147703bc5a46a311a502989f7a721955412acf548275a76b5ff74d4fe35b9e00e66b0c646312a8be908ee106a00383

    • C:\Users\Admin\AppData\Local\Temp\Log\log.txt

      Filesize

      168B

      MD5

      1da0a9e6f14b4076f8e9c782dac14789

      SHA1

      19081892be08ba0bca40e8522b6b97e05090bdc8

      SHA256

      c14039aa26edda98a74a1a90680194ffb37cd18fe0e7ea019db1f9efce3707ac

      SHA512

      15632b90f29f3d28457fe79332204dd74020fd713bc44d49fc744030fb3b42a63ec853ce07e48e3753fafa4d8c59bc98c629973039aa9a38b69c623dc2f6b896

    • C:\Users\Admin\AppData\Local\Temp\Log\log.txt

      Filesize

      210B

      MD5

      d65c8856103f9842974280f139f64fcb

      SHA1

      389c79267dcd3358f7ce5ed27af62287882cba46

      SHA256

      0bd45c7e3ef1ffb51151340e9b145d5732a3568c28a9c29fddf0cf39209c11eb

      SHA512

      72b62d0a11e50111fc80e397bab44967b4d80e86f8d16d268438bd96a2f789206cc61118642160b533f3d066e8116cb8d0830dc4d14885c03da9ebff7d2ea569

    • C:\Users\Admin\AppData\Local\Temp\Log\log.txt

      Filesize

      252B

      MD5

      944c563d17cc53fc75fd761661aafe38

      SHA1

      a0683ad4a104d3099d8041b9c30cc25b0f7b6d94

      SHA256

      c797327dfb9cf2cc49fadfc86fab72874bbb37e135698e64a1423380c6464c66

      SHA512

      5a0830163801e47b26ddf61bf78ae7bf868cd7b190ae5d58a105e38eac0ba785e397c58334d031c4355bf248ee747692bf702cfc019c33f4aed12a854edba1bd

    • memory/1736-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

      Filesize

      8KB