Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47.exe
Resource
win10v2004-20220812-en
General
-
Target
cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47.exe
-
Size
335KB
-
MD5
13eefc2ade99cdf1a50cb8db8546b04f
-
SHA1
d3807954c2e789f710f6445b83d57d2cd8d30c3e
-
SHA256
cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47
-
SHA512
3841fe7eb57adee900bb25dc8707f943ac7be06e951c13d4e42348b4c277aa1f26a67ef54733e561ade455f2cc989598c0bf555f3d913b34b388b7588880395b
-
SSDEEP
6144:PYZfAk+qzkLwfu1n4GlJOK50ybSPG3rOiIKUsd0+VDZgLlffHckW:Al+yIvy1PG7pIKp0+ta5
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1112-56-0x0000000000400000-0x00000000004AD000-memory.dmp upx behavioral1/memory/1136-61-0x0000000000400000-0x00000000004AD000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\dgzXB0YB dgzXB0YB.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1112 cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1112 cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47.exe 1136 dgzXB0YB.exe 1136 dgzXB0YB.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1112 wrote to memory of 1136 1112 cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47.exe 26 PID 1112 wrote to memory of 1136 1112 cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47.exe 26 PID 1112 wrote to memory of 1136 1112 cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47.exe 26 PID 1112 wrote to memory of 1136 1112 cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47.exe"C:\Users\Admin\AppData\Local\Temp\cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\PROGRA~3\dgzXB0YB.exeC:\PROGRA~3\dgzXB0YB.exe2⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1136
-