Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 13:06
Behavioral task
behavioral1
Sample
d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe
Resource
win10v2004-20220812-en
General
-
Target
d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe
-
Size
150KB
-
MD5
0e4c6787230990b1d6ab37e529bfdeea
-
SHA1
cbf69bfe5601a21b101bed6bfc771fe72e28dab9
-
SHA256
d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9
-
SHA512
17f79e7d4480302736ad700086c5307ded3d940260fa6671d234b20ade0b07d66dc09d927b6747aa42c878a1d2f830603480ac530e5be45710ee8a479b69fa23
-
SSDEEP
3072:4DCuZBN4kQZbXQRH2mlj7ud7s01DHVWsrv0:4DCc45Zb2WW6dY0JHVWsrc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1776 apocalyps32.exe -
resource yara_rule behavioral1/memory/1460-55-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1460-58-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00160000000054ab-57.dat upx behavioral1/files/0x00160000000054ab-60.dat upx behavioral1/memory/1776-62-0x0000000040010000-0x000000004004B000-memory.dmp upx behavioral1/memory/1776-65-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\apocalyps32.exe d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe File opened for modification C:\Windows\apocalyps32.exe d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe File created C:\Windows\apocalyps32.exe apocalyps32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1776 1460 d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe 28 PID 1460 wrote to memory of 1776 1460 d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe 28 PID 1460 wrote to memory of 1776 1460 d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe 28 PID 1460 wrote to memory of 1776 1460 d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe 28 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29 PID 1776 wrote to memory of 856 1776 apocalyps32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe"C:\Users\Admin\AppData\Local\Temp\d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\apocalyps32.exe-bs2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:856
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD50e4c6787230990b1d6ab37e529bfdeea
SHA1cbf69bfe5601a21b101bed6bfc771fe72e28dab9
SHA256d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9
SHA51217f79e7d4480302736ad700086c5307ded3d940260fa6671d234b20ade0b07d66dc09d927b6747aa42c878a1d2f830603480ac530e5be45710ee8a479b69fa23
-
Filesize
150KB
MD50e4c6787230990b1d6ab37e529bfdeea
SHA1cbf69bfe5601a21b101bed6bfc771fe72e28dab9
SHA256d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9
SHA51217f79e7d4480302736ad700086c5307ded3d940260fa6671d234b20ade0b07d66dc09d927b6747aa42c878a1d2f830603480ac530e5be45710ee8a479b69fa23