Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.exe
Resource
win10v2004-20220812-en
General
-
Target
95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.exe
-
Size
12.7MB
-
MD5
f246158cf60523a6481089c8f96d091a
-
SHA1
9d6aa1a72bf6cdb6e112e33d8c97c6555d57146b
-
SHA256
95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c
-
SHA512
c004f6b763c475cf7cc5d660fcfa15d2e9dc1961aaad0d056c85ae7556d86528afe206e4b642bf3de9d3c5b5b0ba22864d832635cb275337b138d0261e1a2986
-
SSDEEP
393216:usw0IpL7nHq43isshFDFV3aS2Z/48Wpez6:4rp3KzThHV3iZw8WpE6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1316 95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.tmp -
Loads dropped DLL 1 IoCs
pid Process 1760 95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1316 1760 95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.exe 27 PID 1760 wrote to memory of 1316 1760 95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.exe 27 PID 1760 wrote to memory of 1316 1760 95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.exe 27 PID 1760 wrote to memory of 1316 1760 95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.exe"C:\Users\Admin\AppData\Local\Temp\95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\is-2N8VO.tmp\95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.tmp"C:\Users\Admin\AppData\Local\Temp\is-2N8VO.tmp\95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.tmp" /SL5="$80022,13057270,87040,C:\Users\Admin\AppData\Local\Temp\95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.exe"2⤵
- Executes dropped EXE
PID:1316
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-2N8VO.tmp\95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.tmp
Filesize734KB
MD510934c830465eeb4aa6a3c60dc8d45d6
SHA1447c754f5097c7717c028102736734a99ac67eef
SHA25645f465fa3b6f8ac516aa97e7d8d1fd4dd147de5de24077281512b01ae423d625
SHA512d04a375ab5a510856a63f2f4a7c894de8dd419d68b85880a45b9ca497b1b5b2349570a57b5eca2bdcfae73d7c1fbeba75b925f903edb5adc730db4172eac4afd
-
\Users\Admin\AppData\Local\Temp\is-2N8VO.tmp\95eca2e567da42587bb9a61e977a5b9be6d35802bcc7ec54d3b8a6db42bd697c.tmp
Filesize734KB
MD510934c830465eeb4aa6a3c60dc8d45d6
SHA1447c754f5097c7717c028102736734a99ac67eef
SHA25645f465fa3b6f8ac516aa97e7d8d1fd4dd147de5de24077281512b01ae423d625
SHA512d04a375ab5a510856a63f2f4a7c894de8dd419d68b85880a45b9ca497b1b5b2349570a57b5eca2bdcfae73d7c1fbeba75b925f903edb5adc730db4172eac4afd