Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe
Resource
win10v2004-20220812-en
General
-
Target
c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe
-
Size
28KB
-
MD5
2d6c98c63130144e351d31f701c6c6f6
-
SHA1
6ea6deb08f2cc9a5418e48c0d4bdbfc36eb78dda
-
SHA256
c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704
-
SHA512
519eb5d5ce96e25557e18d0f7dc251b0d8980e50b7b1b2bd39aeeb9d8d02f8123e30b812c966a09deb4bedf7a79784b567bea4f5eac919bb3d498f957b774715
-
SSDEEP
192:VH+eYPFe+h+DhnwHBN0ddLWFkZPejHJPTybATujHJPpP1oynubEp3SAChy:VelPF1hEhnA6nqkBbATm1MbEpCnM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1956 Del27FB.tmp -
Loads dropped DLL 1 IoCs
pid Process 1148 c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1148 c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe 1148 c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe 1956 Del27FB.tmp 1956 Del27FB.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1956 1148 c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe 27 PID 1148 wrote to memory of 1956 1148 c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe 27 PID 1148 wrote to memory of 1956 1148 c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe 27 PID 1148 wrote to memory of 1956 1148 c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe 27 PID 1148 wrote to memory of 1956 1148 c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe 27 PID 1148 wrote to memory of 1956 1148 c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe 27 PID 1148 wrote to memory of 1956 1148 c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe"C:\Users\Admin\AppData\Local\Temp\c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Del27FB.tmp"C:\Users\Admin\AppData\Local\Temp\Del27FB.tmp" 300 C:\Users\Admin\AppData\Local\Temp\c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD52d6c98c63130144e351d31f701c6c6f6
SHA16ea6deb08f2cc9a5418e48c0d4bdbfc36eb78dda
SHA256c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704
SHA512519eb5d5ce96e25557e18d0f7dc251b0d8980e50b7b1b2bd39aeeb9d8d02f8123e30b812c966a09deb4bedf7a79784b567bea4f5eac919bb3d498f957b774715
-
Filesize
28KB
MD52d6c98c63130144e351d31f701c6c6f6
SHA16ea6deb08f2cc9a5418e48c0d4bdbfc36eb78dda
SHA256c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704
SHA512519eb5d5ce96e25557e18d0f7dc251b0d8980e50b7b1b2bd39aeeb9d8d02f8123e30b812c966a09deb4bedf7a79784b567bea4f5eac919bb3d498f957b774715
-
Filesize
28KB
MD52d6c98c63130144e351d31f701c6c6f6
SHA16ea6deb08f2cc9a5418e48c0d4bdbfc36eb78dda
SHA256c5ef3471b0d8a812b495024196d67ba07ba1ce989e8e606c98ddc47f00c2c704
SHA512519eb5d5ce96e25557e18d0f7dc251b0d8980e50b7b1b2bd39aeeb9d8d02f8123e30b812c966a09deb4bedf7a79784b567bea4f5eac919bb3d498f957b774715