Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
1dee41eb3da7edexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
1dee41eb3da7edexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
1dee41eb3da7edexeexeexeex.exe
-
Size
373KB
-
MD5
1dee41eb3da7ed1f50b5c2721c7ba52a
-
SHA1
6256c08f7046ba1ee52d9b405941b4861fdca879
-
SHA256
97deed66d17065adf79e77e13e792e9b7273cb8c0ddb525ce1d68efc5a9c4c44
-
SHA512
bb73ccb93b441df9bd243aab2ca1eb6c62bc53ce7ca37fdb534d2782dc013fc1cbf46a8c034e6ddfb69b20e707efc69c62ef264fb4bc0c34cde3b5f2d5b6002b
-
SSDEEP
6144:CplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:CplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1636 Autorun.exe -
Loads dropped DLL 2 IoCs
pid Process 2932 1dee41eb3da7edexeexeexeex.exe 2932 1dee41eb3da7edexeexeexeex.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Panel\Autorun.exe 1dee41eb3da7edexeexeexeex.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2932 1dee41eb3da7edexeexeexeex.exe 2932 1dee41eb3da7edexeexeexeex.exe 2932 1dee41eb3da7edexeexeexeex.exe 2932 1dee41eb3da7edexeexeexeex.exe 1636 Autorun.exe 1636 Autorun.exe 1636 Autorun.exe 1636 Autorun.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1636 2932 1dee41eb3da7edexeexeexeex.exe 28 PID 2932 wrote to memory of 1636 2932 1dee41eb3da7edexeexeexeex.exe 28 PID 2932 wrote to memory of 1636 2932 1dee41eb3da7edexeexeexeex.exe 28 PID 2932 wrote to memory of 1636 2932 1dee41eb3da7edexeexeexeex.exe 28 PID 2932 wrote to memory of 1636 2932 1dee41eb3da7edexeexeexeex.exe 28 PID 2932 wrote to memory of 1636 2932 1dee41eb3da7edexeexeexeex.exe 28 PID 2932 wrote to memory of 1636 2932 1dee41eb3da7edexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dee41eb3da7edexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\1dee41eb3da7edexeexeexeex.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files\Panel\Autorun.exe"C:\Program Files\Panel\Autorun.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD551dac038e2097b0f80462b903912cedc
SHA130789580e5a9276f8ee39540a60d9a61170bbb33
SHA2564ab14f32b4d7c2768b84b1edf6e9aa8ceb5b667436f539372f98d94f3c8da511
SHA512cba09a693aeaa320ec6f524ff2cb93532534280d0c5d08cc9a843ffdad26242f479407464718e84faa24c3b6a15752d00019130c1f545335a641f93fb60237ce
-
Filesize
374KB
MD551dac038e2097b0f80462b903912cedc
SHA130789580e5a9276f8ee39540a60d9a61170bbb33
SHA2564ab14f32b4d7c2768b84b1edf6e9aa8ceb5b667436f539372f98d94f3c8da511
SHA512cba09a693aeaa320ec6f524ff2cb93532534280d0c5d08cc9a843ffdad26242f479407464718e84faa24c3b6a15752d00019130c1f545335a641f93fb60237ce
-
Filesize
374KB
MD551dac038e2097b0f80462b903912cedc
SHA130789580e5a9276f8ee39540a60d9a61170bbb33
SHA2564ab14f32b4d7c2768b84b1edf6e9aa8ceb5b667436f539372f98d94f3c8da511
SHA512cba09a693aeaa320ec6f524ff2cb93532534280d0c5d08cc9a843ffdad26242f479407464718e84faa24c3b6a15752d00019130c1f545335a641f93fb60237ce
-
Filesize
374KB
MD551dac038e2097b0f80462b903912cedc
SHA130789580e5a9276f8ee39540a60d9a61170bbb33
SHA2564ab14f32b4d7c2768b84b1edf6e9aa8ceb5b667436f539372f98d94f3c8da511
SHA512cba09a693aeaa320ec6f524ff2cb93532534280d0c5d08cc9a843ffdad26242f479407464718e84faa24c3b6a15752d00019130c1f545335a641f93fb60237ce
-
Filesize
374KB
MD551dac038e2097b0f80462b903912cedc
SHA130789580e5a9276f8ee39540a60d9a61170bbb33
SHA2564ab14f32b4d7c2768b84b1edf6e9aa8ceb5b667436f539372f98d94f3c8da511
SHA512cba09a693aeaa320ec6f524ff2cb93532534280d0c5d08cc9a843ffdad26242f479407464718e84faa24c3b6a15752d00019130c1f545335a641f93fb60237ce