Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe
Resource
win10v2004-20220901-en
General
-
Target
c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe
-
Size
720KB
-
MD5
a2875bc5c41929260d59bfcd2b2e56a0
-
SHA1
d39355d6a5f59a7bbf57f1e6a563f1c416fb74bf
-
SHA256
c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6
-
SHA512
a3186766dbf2bd32fd8bbcdfa01827362c1cfc558b27fec3582e9cc0c0fa28f6e3b61c78030f1aa21097d5165d67d8036cfa9db64668b65b735a75ede1eed0af
-
SSDEEP
12288:6luDk67Sz3zKQeW1zRRaMMMMM2MMMMMfSDyo1tjG:Lk6BK1zRRaMMMMM2MMMMMKDyo1tjG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1460 c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.com -
Loads dropped DLL 2 IoCs
pid Process 1504 c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe 1504 c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\svchost.exe c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe File opened for modification C:\Windows\kernel.dll c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe File created C:\Windows\kernel.dll c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1504 c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1460 1504 c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe 26 PID 1504 wrote to memory of 1460 1504 c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe 26 PID 1504 wrote to memory of 1460 1504 c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe 26 PID 1504 wrote to memory of 1460 1504 c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe 26 PID 1504 wrote to memory of 1396 1504 c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe"C:\Users\Admin\AppData\Local\Temp\c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.comC:\Users\Admin\AppData\Local\Temp\c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.com3⤵
- Executes dropped EXE
PID:1460
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.com
Filesize631KB
MD5e23aede635f48459bb7a19168a423894
SHA1536da147b0adba5087c1e5795427814aa19c6ed6
SHA25603b3f301f5790db7c6358505574c17f8dc39dee92e57c4fba6382f4eb3ef76d9
SHA512d2c7a7dd2038c875da397043297e052cf81324be9242c2b873adbf71270a9d0fdb861f74925b5e521560c892b6ae161476e6893f226d61b131294ead9a55bc3f
-
\Users\Admin\AppData\Local\Temp\c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.com
Filesize631KB
MD5e23aede635f48459bb7a19168a423894
SHA1536da147b0adba5087c1e5795427814aa19c6ed6
SHA25603b3f301f5790db7c6358505574c17f8dc39dee92e57c4fba6382f4eb3ef76d9
SHA512d2c7a7dd2038c875da397043297e052cf81324be9242c2b873adbf71270a9d0fdb861f74925b5e521560c892b6ae161476e6893f226d61b131294ead9a55bc3f
-
\Users\Admin\AppData\Local\Temp\c34d18d625f0ab539cc01ed95f143a8f0677e4ddb10fee92144c6a5ddd306be6.com
Filesize631KB
MD5e23aede635f48459bb7a19168a423894
SHA1536da147b0adba5087c1e5795427814aa19c6ed6
SHA25603b3f301f5790db7c6358505574c17f8dc39dee92e57c4fba6382f4eb3ef76d9
SHA512d2c7a7dd2038c875da397043297e052cf81324be9242c2b873adbf71270a9d0fdb861f74925b5e521560c892b6ae161476e6893f226d61b131294ead9a55bc3f