Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08/01/2023, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
1ff4b22706bde4b2b3fa7e0420324c9f
-
SHA1
aa51221abb1a2cdf7e9c74647b74244aa51a537b
-
SHA256
1116d354a98bdc12eca601d4583d9e5e99c88440c982e845d55b20c95b6e1d64
-
SHA512
aa4896bd9875cd11c8064118042f75636fb009c528bb52c73033ff6083db57a3df786138354e4a4277401a56d2659fd73d5c2315ebc4ae40ce0d93d6bfe3e4c3
-
SSDEEP
196608:91OGkhGzpFVe/j3V2ksfDuZ/bficGVyp9gI5MlFBnqT+fM+L+zq:3O1hGVFVerV2NDuZ2NgMl/qwM+Lsq
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 880 Install.exe 1052 Install.exe -
Loads dropped DLL 8 IoCs
pid Process 1428 file.exe 880 Install.exe 880 Install.exe 880 Install.exe 880 Install.exe 1052 Install.exe 1052 Install.exe 1052 Install.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1428 wrote to memory of 880 1428 file.exe 27 PID 1428 wrote to memory of 880 1428 file.exe 27 PID 1428 wrote to memory of 880 1428 file.exe 27 PID 1428 wrote to memory of 880 1428 file.exe 27 PID 1428 wrote to memory of 880 1428 file.exe 27 PID 1428 wrote to memory of 880 1428 file.exe 27 PID 1428 wrote to memory of 880 1428 file.exe 27 PID 880 wrote to memory of 1052 880 Install.exe 28 PID 880 wrote to memory of 1052 880 Install.exe 28 PID 880 wrote to memory of 1052 880 Install.exe 28 PID 880 wrote to memory of 1052 880 Install.exe 28 PID 880 wrote to memory of 1052 880 Install.exe 28 PID 880 wrote to memory of 1052 880 Install.exe 28 PID 880 wrote to memory of 1052 880 Install.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\7zSFD44.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\7zS4B3.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1052
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.8MB
MD5ff818a3f7a85439624f8e4fda13889c6
SHA197b4573915fabfd6f5a317b7a0b3b668d9de30fc
SHA2566267f16c7a74d8c26f6d6cbe39e28044f55ecf16d82cbdffbc1efd3625393c42
SHA51288731282343df42ede03bf0ba7cbd16ae113a4116c0a65a99b01d1a55b4a6f8498c1d9133bff91a754f09395e49b0c64dbb855691e9f86b74adaf2f79bd6bca2
-
Filesize
6.8MB
MD5ff818a3f7a85439624f8e4fda13889c6
SHA197b4573915fabfd6f5a317b7a0b3b668d9de30fc
SHA2566267f16c7a74d8c26f6d6cbe39e28044f55ecf16d82cbdffbc1efd3625393c42
SHA51288731282343df42ede03bf0ba7cbd16ae113a4116c0a65a99b01d1a55b4a6f8498c1d9133bff91a754f09395e49b0c64dbb855691e9f86b74adaf2f79bd6bca2
-
Filesize
6.3MB
MD5c9a4b35b0baa0f8f6de8de0e9e4ff42d
SHA1af816641d12b8c912dbd7ea537ecc7769008f7a5
SHA256c046f6942f45059c0e6041570fc4b794860caf84d93653e336e1be3fade936f2
SHA512feb475ad02d2e6d862050e4b198359d1a2a1de9139189f6a547702cf0a73bfabe49a3483cf5a2afc7f07df11cc207653c013b9808fc24b75577b71b147209ef4
-
Filesize
6.3MB
MD5c9a4b35b0baa0f8f6de8de0e9e4ff42d
SHA1af816641d12b8c912dbd7ea537ecc7769008f7a5
SHA256c046f6942f45059c0e6041570fc4b794860caf84d93653e336e1be3fade936f2
SHA512feb475ad02d2e6d862050e4b198359d1a2a1de9139189f6a547702cf0a73bfabe49a3483cf5a2afc7f07df11cc207653c013b9808fc24b75577b71b147209ef4
-
Filesize
6.8MB
MD5ff818a3f7a85439624f8e4fda13889c6
SHA197b4573915fabfd6f5a317b7a0b3b668d9de30fc
SHA2566267f16c7a74d8c26f6d6cbe39e28044f55ecf16d82cbdffbc1efd3625393c42
SHA51288731282343df42ede03bf0ba7cbd16ae113a4116c0a65a99b01d1a55b4a6f8498c1d9133bff91a754f09395e49b0c64dbb855691e9f86b74adaf2f79bd6bca2
-
Filesize
6.8MB
MD5ff818a3f7a85439624f8e4fda13889c6
SHA197b4573915fabfd6f5a317b7a0b3b668d9de30fc
SHA2566267f16c7a74d8c26f6d6cbe39e28044f55ecf16d82cbdffbc1efd3625393c42
SHA51288731282343df42ede03bf0ba7cbd16ae113a4116c0a65a99b01d1a55b4a6f8498c1d9133bff91a754f09395e49b0c64dbb855691e9f86b74adaf2f79bd6bca2
-
Filesize
6.8MB
MD5ff818a3f7a85439624f8e4fda13889c6
SHA197b4573915fabfd6f5a317b7a0b3b668d9de30fc
SHA2566267f16c7a74d8c26f6d6cbe39e28044f55ecf16d82cbdffbc1efd3625393c42
SHA51288731282343df42ede03bf0ba7cbd16ae113a4116c0a65a99b01d1a55b4a6f8498c1d9133bff91a754f09395e49b0c64dbb855691e9f86b74adaf2f79bd6bca2
-
Filesize
6.8MB
MD5ff818a3f7a85439624f8e4fda13889c6
SHA197b4573915fabfd6f5a317b7a0b3b668d9de30fc
SHA2566267f16c7a74d8c26f6d6cbe39e28044f55ecf16d82cbdffbc1efd3625393c42
SHA51288731282343df42ede03bf0ba7cbd16ae113a4116c0a65a99b01d1a55b4a6f8498c1d9133bff91a754f09395e49b0c64dbb855691e9f86b74adaf2f79bd6bca2
-
Filesize
6.3MB
MD5c9a4b35b0baa0f8f6de8de0e9e4ff42d
SHA1af816641d12b8c912dbd7ea537ecc7769008f7a5
SHA256c046f6942f45059c0e6041570fc4b794860caf84d93653e336e1be3fade936f2
SHA512feb475ad02d2e6d862050e4b198359d1a2a1de9139189f6a547702cf0a73bfabe49a3483cf5a2afc7f07df11cc207653c013b9808fc24b75577b71b147209ef4
-
Filesize
6.3MB
MD5c9a4b35b0baa0f8f6de8de0e9e4ff42d
SHA1af816641d12b8c912dbd7ea537ecc7769008f7a5
SHA256c046f6942f45059c0e6041570fc4b794860caf84d93653e336e1be3fade936f2
SHA512feb475ad02d2e6d862050e4b198359d1a2a1de9139189f6a547702cf0a73bfabe49a3483cf5a2afc7f07df11cc207653c013b9808fc24b75577b71b147209ef4
-
Filesize
6.3MB
MD5c9a4b35b0baa0f8f6de8de0e9e4ff42d
SHA1af816641d12b8c912dbd7ea537ecc7769008f7a5
SHA256c046f6942f45059c0e6041570fc4b794860caf84d93653e336e1be3fade936f2
SHA512feb475ad02d2e6d862050e4b198359d1a2a1de9139189f6a547702cf0a73bfabe49a3483cf5a2afc7f07df11cc207653c013b9808fc24b75577b71b147209ef4
-
Filesize
6.3MB
MD5c9a4b35b0baa0f8f6de8de0e9e4ff42d
SHA1af816641d12b8c912dbd7ea537ecc7769008f7a5
SHA256c046f6942f45059c0e6041570fc4b794860caf84d93653e336e1be3fade936f2
SHA512feb475ad02d2e6d862050e4b198359d1a2a1de9139189f6a547702cf0a73bfabe49a3483cf5a2afc7f07df11cc207653c013b9808fc24b75577b71b147209ef4