Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
25/04/2023, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
SetupExitLag_v4272.exe
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
SetupExitLag_v4272.exe
Resource
win10v2004-20230220-es
General
-
Target
SetupExitLag_v4272.exe
-
Size
19.7MB
-
MD5
0e0e61bc0176794218f18d35330b0e40
-
SHA1
88cf1a12e45b0edb7fe810c3394299ef2de19b4e
-
SHA256
89180b430afa5712246b5dfce921e7bd02d396dc9195d094ba2e875ec2dbd8ea
-
SHA512
903519017cb52c7e7d614f757370872f3a1c076fcf827c8f3118799559204231472ab05b09b9a3e75476dc5d570b9cd5e947d0652792dafebc935cb966c65243
-
SSDEEP
393216:gUrhBxbvYVjC4OoNvZtTrfCuy9PxkjjlyKXRYa61GDIOZAsqbP7PWZi2u1f:g4aIoJZtffCdZxOlpOUZZZqzrWZA1f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1272 SetupExitLag_v4272.tmp -
Loads dropped DLL 1 IoCs
pid Process 1240 SetupExitLag_v4272.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1272 SetupExitLag_v4272.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1240 wrote to memory of 1272 1240 SetupExitLag_v4272.exe 28 PID 1240 wrote to memory of 1272 1240 SetupExitLag_v4272.exe 28 PID 1240 wrote to memory of 1272 1240 SetupExitLag_v4272.exe 28 PID 1240 wrote to memory of 1272 1240 SetupExitLag_v4272.exe 28 PID 1240 wrote to memory of 1272 1240 SetupExitLag_v4272.exe 28 PID 1240 wrote to memory of 1272 1240 SetupExitLag_v4272.exe 28 PID 1240 wrote to memory of 1272 1240 SetupExitLag_v4272.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\SetupExitLag_v4272.exe"C:\Users\Admin\AppData\Local\Temp\SetupExitLag_v4272.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\is-9OTNP.tmp\SetupExitLag_v4272.tmp"C:\Users\Admin\AppData\Local\Temp\is-9OTNP.tmp\SetupExitLag_v4272.tmp" /SL5="$80130,19829384,887296,C:\Users\Admin\AppData\Local\Temp\SetupExitLag_v4272.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1272
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD55173d5dc7cbf0152255381845c78d927
SHA14d1a5ddec740e6763b9a64aa9112164e93719953
SHA2568d892a27e6d5559ee2dc12f801f3abee78c25891b1e91a0469548fb2866b6fe1
SHA512cd8439a6892d1c15ee10cc4d4ede8c89d43ae2314750661e4ed926910272cefbb5d151fc987ca9c8e61017a1babb4aba685a6e3e13a5b387f06d622ed3d90872
-
Filesize
3.1MB
MD55173d5dc7cbf0152255381845c78d927
SHA14d1a5ddec740e6763b9a64aa9112164e93719953
SHA2568d892a27e6d5559ee2dc12f801f3abee78c25891b1e91a0469548fb2866b6fe1
SHA512cd8439a6892d1c15ee10cc4d4ede8c89d43ae2314750661e4ed926910272cefbb5d151fc987ca9c8e61017a1babb4aba685a6e3e13a5b387f06d622ed3d90872