Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe
Resource
win7-20221111-en
General
-
Target
33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe
-
Size
96KB
-
MD5
c22b9b7fd851e2f4d24d7fdc1d67a231
-
SHA1
6c309c1146fd6f753e3425f1c50c8a1a6a34d0ea
-
SHA256
33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673
-
SHA512
91b19696a93f21f403055b576e55e3257f739821aeafab7c77cfbd0ace9982ea892b8067e31f456d5cab7f41d6bbd27286370f73de12d92a16c3bf36b2788afc
-
SSDEEP
1536:lDFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prpnE+uv:l9S4jHS8q/3nTzePCwNUh4E9pnHuv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1512 ebtvhneevn -
Deletes itself 1 IoCs
pid Process 1512 ebtvhneevn -
Loads dropped DLL 2 IoCs
pid Process 2040 33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe 2040 33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1512 ebtvhneevn -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1512 2040 33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe 28 PID 2040 wrote to memory of 1512 2040 33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe 28 PID 2040 wrote to memory of 1512 2040 33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe 28 PID 2040 wrote to memory of 1512 2040 33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe"C:\Users\Admin\AppData\Local\Temp\33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2040 -
\??\c:\users\admin\appdata\local\ebtvhneevn"C:\Users\Admin\AppData\Local\Temp\33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe" a -sc:\users\admin\appdata\local\temp\33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.0MB
MD5dfca98783bb280f242e920bc9b44a6a5
SHA1e6c2204affd97523e92cb2044f35de098052c6a9
SHA2569c7f870f65584f993ea8cf9a3fb4e1def17790b91000ee0ed04506eb81b98ed6
SHA512b3910713865a371adbc541da4c1737484d384a4f4d92c8ea34603dd2c3380f541bed4f5d7dc1101ccdb3d3df8ee93fb9f1306f7e3aa1e547e5b184f497ee5129
-
Filesize
21.0MB
MD5dfca98783bb280f242e920bc9b44a6a5
SHA1e6c2204affd97523e92cb2044f35de098052c6a9
SHA2569c7f870f65584f993ea8cf9a3fb4e1def17790b91000ee0ed04506eb81b98ed6
SHA512b3910713865a371adbc541da4c1737484d384a4f4d92c8ea34603dd2c3380f541bed4f5d7dc1101ccdb3d3df8ee93fb9f1306f7e3aa1e547e5b184f497ee5129
-
Filesize
21.0MB
MD5dfca98783bb280f242e920bc9b44a6a5
SHA1e6c2204affd97523e92cb2044f35de098052c6a9
SHA2569c7f870f65584f993ea8cf9a3fb4e1def17790b91000ee0ed04506eb81b98ed6
SHA512b3910713865a371adbc541da4c1737484d384a4f4d92c8ea34603dd2c3380f541bed4f5d7dc1101ccdb3d3df8ee93fb9f1306f7e3aa1e547e5b184f497ee5129