Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
44311721be798cexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
44311721be798cexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
44311721be798cexeexeexeex.exe
-
Size
240KB
-
MD5
44311721be798c45e60d0056ef9dd65c
-
SHA1
4e1301df16a07ee73b9fcd5ea38da9cb84fb781a
-
SHA256
4903d7f9b9efe5c15315ba9cf2783a895d97a89795cb3c354b30a9c7af08af00
-
SHA512
de8db9c0081c781417fe2e58d38cd84b1feb5f1bb9df9d4fe13e1f7df84d094658bfba940789ac6b02db2c2288bde0b4cb7ef45163430928e9f03245a5af8cd0
-
SSDEEP
3072:lxUm75Fku3eKeO213SJReOqdmErj+HyHnNVIPL/+ybbiW1u46Q7qV3lU8xM:fU8Dk11CJ1qDWUNVIT/bblS9x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 668 .exe -
Loads dropped DLL 2 IoCs
pid Process 2112 44311721be798cexeexeexeex.exe 2112 44311721be798cexeexeexeex.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\.exe 44311721be798cexeexeexeex.exe File opened for modification C:\Program Files\.exe 44311721be798cexeexeexeex.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2112 44311721be798cexeexeexeex.exe 2112 44311721be798cexeexeexeex.exe 2112 44311721be798cexeexeexeex.exe 2112 44311721be798cexeexeexeex.exe 668 .exe 668 .exe 668 .exe 668 .exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 668 2112 44311721be798cexeexeexeex.exe 28 PID 2112 wrote to memory of 668 2112 44311721be798cexeexeexeex.exe 28 PID 2112 wrote to memory of 668 2112 44311721be798cexeexeexeex.exe 28 PID 2112 wrote to memory of 668 2112 44311721be798cexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\44311721be798cexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\44311721be798cexeexeexeex.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files\.exe"C:\Program Files\\.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:668
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD50105de7853a3adc4099d98e26b4691a7
SHA17a8dca80d7cb3116a89228044737882535a9660a
SHA256717ab5c8830425a8b2b681bbc69b1f90aa74a72e57dfde33ce842ec733b6e737
SHA5129da5aea809842ca7e0ba1e491b809d3a0151c92ef4be0e016b7763b01d817e255533124ab27cf786d9db985fb66bacf3f4a5ff5d188f607bd253ec017cc40696
-
Filesize
240KB
MD50105de7853a3adc4099d98e26b4691a7
SHA17a8dca80d7cb3116a89228044737882535a9660a
SHA256717ab5c8830425a8b2b681bbc69b1f90aa74a72e57dfde33ce842ec733b6e737
SHA5129da5aea809842ca7e0ba1e491b809d3a0151c92ef4be0e016b7763b01d817e255533124ab27cf786d9db985fb66bacf3f4a5ff5d188f607bd253ec017cc40696
-
Filesize
240KB
MD50105de7853a3adc4099d98e26b4691a7
SHA17a8dca80d7cb3116a89228044737882535a9660a
SHA256717ab5c8830425a8b2b681bbc69b1f90aa74a72e57dfde33ce842ec733b6e737
SHA5129da5aea809842ca7e0ba1e491b809d3a0151c92ef4be0e016b7763b01d817e255533124ab27cf786d9db985fb66bacf3f4a5ff5d188f607bd253ec017cc40696
-
Filesize
240KB
MD50105de7853a3adc4099d98e26b4691a7
SHA17a8dca80d7cb3116a89228044737882535a9660a
SHA256717ab5c8830425a8b2b681bbc69b1f90aa74a72e57dfde33ce842ec733b6e737
SHA5129da5aea809842ca7e0ba1e491b809d3a0151c92ef4be0e016b7763b01d817e255533124ab27cf786d9db985fb66bacf3f4a5ff5d188f607bd253ec017cc40696