Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/01/2023, 03:39
Static task
static1
Behavioral task
behavioral1
Sample
61a40094b63c6d2bb8a1f823cfedb09a12c12a56ab5b0e3df23d0083789e5b60.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61a40094b63c6d2bb8a1f823cfedb09a12c12a56ab5b0e3df23d0083789e5b60.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
bd384eb4dd47543a0d0aaf58496df3211dcd6bd4b94a11378f07b10938ec8733.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
bd384eb4dd47543a0d0aaf58496df3211dcd6bd4b94a11378f07b10938ec8733.exe
Resource
win10v2004-20220812-en
General
-
Target
61a40094b63c6d2bb8a1f823cfedb09a12c12a56ab5b0e3df23d0083789e5b60.exe
-
Size
1.4MB
-
MD5
494f68dd5ef8b1684099a4ee87c9406c
-
SHA1
0fd737f070f8bd3076fae7baeb201993a2fd6faa
-
SHA256
61a40094b63c6d2bb8a1f823cfedb09a12c12a56ab5b0e3df23d0083789e5b60
-
SHA512
cc264dcf386dbb282857524b96759b35f91951465cc79ddb07680d0fed3660c244baeb6dde2f0b7eead0c0161925b62d3b818ba95527be51a7e772b2c7fadafa
-
SSDEEP
24576:vlsopsrCHoeC7fAoK56DlfSB9DKG7hYfkRQRGcsunX8JyFH8R+fmrjswhUAnV:vlsoWrCHAfA0DlKAGqkC8qjc9r4qUE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1684 N11W94UKOS15G7H37U461NA.exe -
Loads dropped DLL 1 IoCs
pid Process 1684 N11W94UKOS15G7H37U461NA.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1684 N11W94UKOS15G7H37U461NA.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1684 2028 61a40094b63c6d2bb8a1f823cfedb09a12c12a56ab5b0e3df23d0083789e5b60.exe 27 PID 2028 wrote to memory of 1684 2028 61a40094b63c6d2bb8a1f823cfedb09a12c12a56ab5b0e3df23d0083789e5b60.exe 27 PID 2028 wrote to memory of 1684 2028 61a40094b63c6d2bb8a1f823cfedb09a12c12a56ab5b0e3df23d0083789e5b60.exe 27 PID 2028 wrote to memory of 1684 2028 61a40094b63c6d2bb8a1f823cfedb09a12c12a56ab5b0e3df23d0083789e5b60.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\61a40094b63c6d2bb8a1f823cfedb09a12c12a56ab5b0e3df23d0083789e5b60.exe"C:\Users\Admin\AppData\Local\Temp\61a40094b63c6d2bb8a1f823cfedb09a12c12a56ab5b0e3df23d0083789e5b60.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\rl82528f4h6k8skc83jqrs100\N11W94UKOS15G7H37U461NA.exeC:\Users\Admin\AppData\Roaming\rl82528f4h6k8skc83jqrs100\N11W94UKOS15G7H37U461NA.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1684
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252B
MD57ca773e631f4e528d11da2063b6e50e4
SHA15a5227e1e932a0f30fe2aeca80ef16d492881407
SHA256abd313f0128abb934e019c96509e7fae1514bec3535b455779b81405871796b3
SHA512444df45d85857e97c75b4fde895b13613594ac568092f401d846b0fe66eff82d9fa502fcda2d38e7851cf359dd1893ff78d436fef53841b1e54f3f99a988c7f1
-
Filesize
678KB
MD59c38e5cfa356b47b1c060179f385f1e2
SHA1f13ec2136c092dff2a095e2b3040977200ae0b97
SHA2561fe4c08701c24b3592933c073ce170268ac2809e7f3b8e65f46b0e54b01e16cc
SHA512c01972e1a8057ce9731165e31833d4c00d183438be9201b114b31eb56ea8a809d8408ff36802f3cb27849e8a20420619c4456dfd6ee28ab8ba426c3904ac37bb
-
Filesize
678KB
MD59c38e5cfa356b47b1c060179f385f1e2
SHA1f13ec2136c092dff2a095e2b3040977200ae0b97
SHA2561fe4c08701c24b3592933c073ce170268ac2809e7f3b8e65f46b0e54b01e16cc
SHA512c01972e1a8057ce9731165e31833d4c00d183438be9201b114b31eb56ea8a809d8408ff36802f3cb27849e8a20420619c4456dfd6ee28ab8ba426c3904ac37bb
-
Filesize
448KB
MD5d93c9553cac111bf10ea9fef66c018cb
SHA1dffa7b8e5b4b5a8cb41fa55d3bdc485ad9f89f85
SHA256f3c7f9276cf0406f5799d88df0b9e8db7cc33a4ea61e7e0579ca6f57610bb77a
SHA512cc91434ceaf6ec21db0253d9db959d1f6abed7c58b2c7912d604d7c3ab07ea372c43ac4210fdf3004ac62e2e995afb636dd4fd347a5623acba38d5394de248f1
-
Filesize
448KB
MD5d93c9553cac111bf10ea9fef66c018cb
SHA1dffa7b8e5b4b5a8cb41fa55d3bdc485ad9f89f85
SHA256f3c7f9276cf0406f5799d88df0b9e8db7cc33a4ea61e7e0579ca6f57610bb77a
SHA512cc91434ceaf6ec21db0253d9db959d1f6abed7c58b2c7912d604d7c3ab07ea372c43ac4210fdf3004ac62e2e995afb636dd4fd347a5623acba38d5394de248f1