Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
415cf2333734857def103f8f15de3091bd115454b787c118aabd763b6d3d125e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
415cf2333734857def103f8f15de3091bd115454b787c118aabd763b6d3d125e.exe
Resource
win10v2004-20220812-en
General
-
Target
415cf2333734857def103f8f15de3091bd115454b787c118aabd763b6d3d125e.exe
-
Size
32KB
-
MD5
325fffeb14c48b7bc8a680b640307682
-
SHA1
a86d2020661fc3c98fa43a9578aad227311453cb
-
SHA256
415cf2333734857def103f8f15de3091bd115454b787c118aabd763b6d3d125e
-
SHA512
b91b9f38fb2a2e79a5252a22710d83742f39595b1666c80fc29624452756ad4e2856cb805cbbad58cda28ad38261d4de64ba1da67728ccfd762405feece82737
-
SSDEEP
768:c6R9xrFXHDnwZUszq0hRX6cmO1Sg5sX3M0sXn:c67xr5HDwZUARXV/SHM0c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 pixeldays.exe -
Deletes itself 1 IoCs
pid Process 2036 pixeldays.exe -
Loads dropped DLL 1 IoCs
pid Process 1724 415cf2333734857def103f8f15de3091bd115454b787c118aabd763b6d3d125e.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 checkip.dyndns.org -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2036 1724 415cf2333734857def103f8f15de3091bd115454b787c118aabd763b6d3d125e.exe 27 PID 1724 wrote to memory of 2036 1724 415cf2333734857def103f8f15de3091bd115454b787c118aabd763b6d3d125e.exe 27 PID 1724 wrote to memory of 2036 1724 415cf2333734857def103f8f15de3091bd115454b787c118aabd763b6d3d125e.exe 27 PID 1724 wrote to memory of 2036 1724 415cf2333734857def103f8f15de3091bd115454b787c118aabd763b6d3d125e.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\415cf2333734857def103f8f15de3091bd115454b787c118aabd763b6d3d125e.exe"C:\Users\Admin\AppData\Local\Temp\415cf2333734857def103f8f15de3091bd115454b787c118aabd763b6d3d125e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\pixeldays.exeC:\Users\Admin\AppData\Local\Temp\pixeldays.exe2⤵
- Executes dropped EXE
- Deletes itself
PID:2036
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5ff406b7c8b2cd800531da9be16e7e763
SHA10c138e35a2c1be8adc0267ec0b5e6300280a0014
SHA256a188f95bb3713e3ad120da896a433f9b7db027819c5cfc27f6f1e3c0e94a8636
SHA512f306f9177f15bc219f53fcc1e5339530558ed5c381e168880b73c5176d25d0b738d097a84160c1bf2eb84f481d61551cf193a14c27d129aafa1ebcad797b2156
-
Filesize
32KB
MD5ff406b7c8b2cd800531da9be16e7e763
SHA10c138e35a2c1be8adc0267ec0b5e6300280a0014
SHA256a188f95bb3713e3ad120da896a433f9b7db027819c5cfc27f6f1e3c0e94a8636
SHA512f306f9177f15bc219f53fcc1e5339530558ed5c381e168880b73c5176d25d0b738d097a84160c1bf2eb84f481d61551cf193a14c27d129aafa1ebcad797b2156
-
Filesize
32KB
MD5ff406b7c8b2cd800531da9be16e7e763
SHA10c138e35a2c1be8adc0267ec0b5e6300280a0014
SHA256a188f95bb3713e3ad120da896a433f9b7db027819c5cfc27f6f1e3c0e94a8636
SHA512f306f9177f15bc219f53fcc1e5339530558ed5c381e168880b73c5176d25d0b738d097a84160c1bf2eb84f481d61551cf193a14c27d129aafa1ebcad797b2156