Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
13/03/2023, 17:00
230313-vhycasbc79 713/03/2023, 16:55
230313-vfj2wsbc74 713/03/2023, 16:51
230313-vcsvmabc57 7Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/03/2023, 16:55
Behavioral task
behavioral1
Sample
loadez.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
loadez.exe
Resource
win10v2004-20230220-en
General
-
Target
loadez.exe
-
Size
6.1MB
-
MD5
8c563d9a30e6917e54634f7ab69d237a
-
SHA1
c02a4261ec7636051e987716591aa857c66b8e8f
-
SHA256
4150c0ae6b99bcb70156e355bdfdd198ac37a0fcb80631778cc4b7fffe346db4
-
SHA512
7103275e3c0ff0433ec52d5d7db25f91c725dc512f2a8b93259e07a30b87c8cdc26e14cab34e2569e4e776165bbe19eab4b117535caf3949d1fd7ffacd81da79
-
SSDEEP
196608:HdowZEL2Vmd6+Di2c/f/+ScEVRyneyDFh:y1L2Vmd6mJc/eWRghFh
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1484 loadez.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1484 2000 loadez.exe 28 PID 2000 wrote to memory of 1484 2000 loadez.exe 28 PID 2000 wrote to memory of 1484 2000 loadez.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81