Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
dece0b4964e4e0fb36bf957f448067eb47aa24d8c6a30dd7d6f17dff66591aa4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dece0b4964e4e0fb36bf957f448067eb47aa24d8c6a30dd7d6f17dff66591aa4.exe
Resource
win10v2004-20221111-en
General
-
Target
dece0b4964e4e0fb36bf957f448067eb47aa24d8c6a30dd7d6f17dff66591aa4.exe
-
Size
38KB
-
MD5
b450e215061c036b23e5d79e2439a3c9
-
SHA1
3c2139b217397d402e0ea7ed5d0af726466f966e
-
SHA256
dece0b4964e4e0fb36bf957f448067eb47aa24d8c6a30dd7d6f17dff66591aa4
-
SHA512
7305c2c68b8159620663a125af09bee6723f83b864bae41d391ed0fc8a9944b48b0a2a330da1d3a9bb401b25f5224a86970dccf1dcebd5118b5e9aafd5d2f648
-
SSDEEP
768:wOF+DokxB/3mthptR49GbR4xgpT1TX/PP5T:w/ckHfCK9i4e1P5T
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1752 svchost.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dxdiag.exe svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dxdiag.exe svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1052 dece0b4964e4e0fb36bf957f448067eb47aa24d8c6a30dd7d6f17dff66591aa4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1052 wrote to memory of 1752 1052 dece0b4964e4e0fb36bf957f448067eb47aa24d8c6a30dd7d6f17dff66591aa4.exe 28 PID 1052 wrote to memory of 1752 1052 dece0b4964e4e0fb36bf957f448067eb47aa24d8c6a30dd7d6f17dff66591aa4.exe 28 PID 1052 wrote to memory of 1752 1052 dece0b4964e4e0fb36bf957f448067eb47aa24d8c6a30dd7d6f17dff66591aa4.exe 28 PID 1052 wrote to memory of 1752 1052 dece0b4964e4e0fb36bf957f448067eb47aa24d8c6a30dd7d6f17dff66591aa4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dece0b4964e4e0fb36bf957f448067eb47aa24d8c6a30dd7d6f17dff66591aa4.exe"C:\Users\Admin\AppData\Local\Temp\dece0b4964e4e0fb36bf957f448067eb47aa24d8c6a30dd7d6f17dff66591aa4.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
- Drops startup file
PID:1752
-