Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
9s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe
Resource
win10v2004-20220812-en
General
-
Target
800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe
-
Size
33KB
-
MD5
c61c12a079c2a36fe1400e3e6ca3ba7c
-
SHA1
29042b356c6a0b993fe3882d6fa3e1864ee0bea2
-
SHA256
800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0
-
SHA512
d3543e20019efd8aa3976119b5ea10b0b1c71295a13f6fe6ae7fb3b6af9d1a7db2a22df585e513135e37b24ddff43848b0edb63ebc9703d35d54acab20282e21
-
SSDEEP
768:tU6lOwkh7JsymO9YFymb68dZxowwN41IoEI4wy741uM:swilsymO9BmNFwN4Yi5L
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2036 lsass.exe 1184 lsass.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Debugs.inf 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe File created C:\Windows\lsass.exe 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe File opened for modification C:\Windows\lsass.exe 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe File created C:\Windows\Debugs.inf lsass.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 836 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 1932 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 2036 lsass.exe 1184 lsass.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 836 wrote to memory of 1932 836 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 27 PID 836 wrote to memory of 1932 836 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 27 PID 836 wrote to memory of 1932 836 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 27 PID 836 wrote to memory of 1932 836 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 27 PID 836 wrote to memory of 1932 836 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 27 PID 836 wrote to memory of 1932 836 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 27 PID 836 wrote to memory of 1932 836 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 27 PID 1932 wrote to memory of 2036 1932 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 28 PID 1932 wrote to memory of 2036 1932 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 28 PID 1932 wrote to memory of 2036 1932 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 28 PID 1932 wrote to memory of 2036 1932 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 28 PID 1932 wrote to memory of 2036 1932 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 28 PID 1932 wrote to memory of 2036 1932 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 28 PID 1932 wrote to memory of 2036 1932 800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe 28 PID 2036 wrote to memory of 1184 2036 lsass.exe 29 PID 2036 wrote to memory of 1184 2036 lsass.exe 29 PID 2036 wrote to memory of 1184 2036 lsass.exe 29 PID 2036 wrote to memory of 1184 2036 lsass.exe 29 PID 2036 wrote to memory of 1184 2036 lsass.exe 29 PID 2036 wrote to memory of 1184 2036 lsass.exe 29 PID 2036 wrote to memory of 1184 2036 lsass.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe"C:\Users\Admin\AppData\Local\Temp\800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe"C:\Users\Admin\AppData\Local\Temp\800348d738b503fe6758c8a053bca5be46a58c9b63c9bdcb6c88660f6ef03dd0.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\lsass.exe"C:\Windows\lsass.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\lsass.exe"C:\Windows\lsass.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.2MB
MD50b6e42d301b3bd6637b292986e52d6e5
SHA17009656d8ccd31572b65500664b78b0eb51b89e7
SHA256e50ddc6fa894ebea5ff8df68b766e0d69b030bdf74f6fcea1583e06096b75d65
SHA512662ca48a7e496eb4de3b7ee63d451c5ae3806e08b972618188fe1eab85c41a544c16956dd604440bcd6d4a42b030de81003e225c805d6a59986089f2f9bc812a
-
Filesize
12.2MB
MD50b6e42d301b3bd6637b292986e52d6e5
SHA17009656d8ccd31572b65500664b78b0eb51b89e7
SHA256e50ddc6fa894ebea5ff8df68b766e0d69b030bdf74f6fcea1583e06096b75d65
SHA512662ca48a7e496eb4de3b7ee63d451c5ae3806e08b972618188fe1eab85c41a544c16956dd604440bcd6d4a42b030de81003e225c805d6a59986089f2f9bc812a
-
Filesize
12.2MB
MD50b6e42d301b3bd6637b292986e52d6e5
SHA17009656d8ccd31572b65500664b78b0eb51b89e7
SHA256e50ddc6fa894ebea5ff8df68b766e0d69b030bdf74f6fcea1583e06096b75d65
SHA512662ca48a7e496eb4de3b7ee63d451c5ae3806e08b972618188fe1eab85c41a544c16956dd604440bcd6d4a42b030de81003e225c805d6a59986089f2f9bc812a