Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
27s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
07/07/2023, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
5dee4c2abca557exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
5dee4c2abca557exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
5dee4c2abca557exeexeexeex.exe
-
Size
411KB
-
MD5
5dee4c2abca557b22f297a56195f8344
-
SHA1
d2a8b535b6cf99814bee89f5e97c43d983f4994f
-
SHA256
ac6639f64748b8db3d593dfc79926b57ae8af5683f99d0e3568929bd7600d7a1
-
SHA512
599a1463e11cfdaef45b6288b9a67a93f382c0ef762aaa64ae2d47414ae4f4386302f492eae9a28b5da722cdcbb0d9d3271738643007ee8b2d3a8cc0ea19ee43
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mF6rNpewDMJ6ir2WpsHChLqH:gZLolhNVyEBNQsMJ6irv6C5qH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1872 2DF4.tmp -
Executes dropped EXE 1 IoCs
pid Process 1872 2DF4.tmp -
Loads dropped DLL 1 IoCs
pid Process 2296 5dee4c2abca557exeexeexeex.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1872 2296 5dee4c2abca557exeexeexeex.exe 29 PID 2296 wrote to memory of 1872 2296 5dee4c2abca557exeexeexeex.exe 29 PID 2296 wrote to memory of 1872 2296 5dee4c2abca557exeexeexeex.exe 29 PID 2296 wrote to memory of 1872 2296 5dee4c2abca557exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dee4c2abca557exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\5dee4c2abca557exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\2DF4.tmp"C:\Users\Admin\AppData\Local\Temp\2DF4.tmp" --pingC:\Users\Admin\AppData\Local\Temp\5dee4c2abca557exeexeexeex.exe 7F7B3A7392D745D023AB0F60C0E9F7D76C0D7E1E14F8849A913485A4C85804F1861E1474790FC652B64162A2456544210837ED9EE0A1C1EE4F4F62A7D5D2ACFA2⤵
- Deletes itself
- Executes dropped EXE
PID:1872
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD57a4c692fb60c573d3194bc3e07246b22
SHA1e5735327ce45763eadd326c5563eac6140a2a078
SHA256e38b5fd6896111c884612ce6c0b9c793a0e1efdc68d3717502ec768976fbc2d4
SHA512ad1c5328387ab20e1cca0ba92351634c93c10237f2a5356df7f0aa7a2900c48bdee2f52c3ead4a349035049e94f22c3d087c406d4151019544869d6ded083dd1
-
Filesize
411KB
MD57a4c692fb60c573d3194bc3e07246b22
SHA1e5735327ce45763eadd326c5563eac6140a2a078
SHA256e38b5fd6896111c884612ce6c0b9c793a0e1efdc68d3717502ec768976fbc2d4
SHA512ad1c5328387ab20e1cca0ba92351634c93c10237f2a5356df7f0aa7a2900c48bdee2f52c3ead4a349035049e94f22c3d087c406d4151019544869d6ded083dd1