Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24/05/2023, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe
Resource
win10v2004-20230221-en
General
-
Target
free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe
-
Size
1.7MB
-
MD5
b01445231a203d761f6806350c6b4da7
-
SHA1
590d3af0e35d10659473c878e80894330ed23c45
-
SHA256
10f81c435c9a627bd1d8bc04fded50a723cd3afb59ddfd1441288c637fb0e7cc
-
SHA512
208c70364fbb5b958396149629f5d85bb02cf1bb47d5c047afb9569eac2bf3cac75e8a50b01636a069a213dde5b1843e6b8b846a73e4a9432a17c4fa35fd1779
-
SSDEEP
24576:A7FUDowAyrTVE3U5FmEj6CIFeuTxV/A/Tcr/OzuwibgRb+V8Wb:ABuZrEUR6C6euTxV/ALcr0uxzS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2032 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp -
Loads dropped DLL 1 IoCs
pid Process 1848 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2032 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2032 1848 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe 26 PID 1848 wrote to memory of 2032 1848 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe 26 PID 1848 wrote to memory of 2032 1848 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe 26 PID 1848 wrote to memory of 2032 1848 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe 26 PID 1848 wrote to memory of 2032 1848 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe 26 PID 1848 wrote to memory of 2032 1848 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe 26 PID 1848 wrote to memory of 2032 1848 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe"C:\Users\Admin\AppData\Local\Temp\free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\is-BLDBS.tmp\free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp"C:\Users\Admin\AppData\Local\Temp\is-BLDBS.tmp\free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp" /SL5="$70124,879088,832512,C:\Users\Admin\AppData\Local\Temp\free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2032
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-BLDBS.tmp\free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp
Filesize3.1MB
MD5c4630882db671a55924f100c5c1f0056
SHA124c08e7061301d9a3ef6b2fbbbbad484e5f4bc37
SHA25649cbceb57abe33bad7c5f8c56a8bc5ddd06507d185859554f1de31f3761741e3
SHA5126d044efc68d07317b298fa10ed6d68a6b36df6a31c57f32fc0e358ad2c039307dcec9a1755e3b2dac48efa6a9f31845aa0ae52d2b67e7daeb6ea503ec45257d6
-
\Users\Admin\AppData\Local\Temp\is-BLDBS.tmp\free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp
Filesize3.1MB
MD5c4630882db671a55924f100c5c1f0056
SHA124c08e7061301d9a3ef6b2fbbbbad484e5f4bc37
SHA25649cbceb57abe33bad7c5f8c56a8bc5ddd06507d185859554f1de31f3761741e3
SHA5126d044efc68d07317b298fa10ed6d68a6b36df6a31c57f32fc0e358ad2c039307dcec9a1755e3b2dac48efa6a9f31845aa0ae52d2b67e7daeb6ea503ec45257d6