Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    37s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 15:33 UTC

General

  • Target

    8ad7e88c76451073258e450558ab48b25af1f9e0b7873e9671a6d122b4e06f7b.exe

  • Size

    489KB

  • MD5

    830987eaccc1d5ef2447b0770fa09ef2

  • SHA1

    295f50f360019b60ccefb29bd271bff816a5c86e

  • SHA256

    8ad7e88c76451073258e450558ab48b25af1f9e0b7873e9671a6d122b4e06f7b

  • SHA512

    c43ee4a92a8bc172f04b3bdf0267d7d193fc10d20e327c088062d908c2e7d74b44ecc9465273bd01d73f60d0aaae1313f1d8a9e570a9abf85da7d2389d57a5f5

  • SSDEEP

    12288:lONDTMyQd/JXm21VDO0wGzsBbHEuJH6PZoy6:EN/EJWKlwy6Ea6PyB

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ad7e88c76451073258e450558ab48b25af1f9e0b7873e9671a6d122b4e06f7b.exe
    "C:\Users\Admin\AppData\Local\Temp\8ad7e88c76451073258e450558ab48b25af1f9e0b7873e9671a6d122b4e06f7b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\AppData\Local\Temp\8ad7e88c76451073258e450558ab48b25af1f9e0b7873e9671a6d122b4e06f7b.exe
      start
      2⤵
        PID:1488
      • C:\Users\Admin\AppData\Local\Temp\8ad7e88c76451073258e450558ab48b25af1f9e0b7873e9671a6d122b4e06f7b.exe
        watch
        2⤵
          PID:936

      Network

      • flag-unknown
        DNS
        forces.pro2015stroy.ru
        8ad7e88c76451073258e450558ab48b25af1f9e0b7873e9671a6d122b4e06f7b.exe
        Remote address:
        8.8.8.8:53
        Request
        forces.pro2015stroy.ru
        IN A
        Response
      No results found
      • 8.8.8.8:53
        forces.pro2015stroy.ru
        dns
        8ad7e88c76451073258e450558ab48b25af1f9e0b7873e9671a6d122b4e06f7b.exe
        68 B
        129 B
        1
        1

        DNS Request

        forces.pro2015stroy.ru

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/936-61-0x0000000000400000-0x0000000000480000-memory.dmp

        Filesize

        512KB

      • memory/936-64-0x0000000000400000-0x0000000000480000-memory.dmp

        Filesize

        512KB

      • memory/1368-54-0x0000000076071000-0x0000000076073000-memory.dmp

        Filesize

        8KB

      • memory/1368-59-0x0000000000400000-0x0000000000480000-memory.dmp

        Filesize

        512KB

      • memory/1488-60-0x0000000000400000-0x0000000000480000-memory.dmp

        Filesize

        512KB

      • memory/1488-62-0x0000000000400000-0x0000000000480000-memory.dmp

        Filesize

        512KB

      • memory/1488-63-0x0000000000400000-0x0000000000480000-memory.dmp

        Filesize

        512KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.