Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16/07/2023, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
65af203058c59f_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
65af203058c59f_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
65af203058c59f_JC.exe
-
Size
374KB
-
MD5
65af203058c59f7ec9cf2fa5dc59aee7
-
SHA1
2f7bfbcdb73fa17c395803c7d1ad734b5f57805a
-
SHA256
e0bc70894bf4503999fed31ee0f8b48c50d37a30d97caa7aebcf5f0b5344baa1
-
SHA512
346c9f1aa46218803339377b429239288f07ef332a2eb7cedf122d0f26005e5aafeb1f3bdac117c7a5b3b43deda97b971118f840de03d1a84ff729999eab9416
-
SSDEEP
6144:NplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:NplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2500 install.exe -
Loads dropped DLL 4 IoCs
pid Process 2472 65af203058c59f_JC.exe 2500 install.exe 2500 install.exe 2500 install.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\privileges\install.exe 65af203058c59f_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2472 65af203058c59f_JC.exe 2472 65af203058c59f_JC.exe 2472 65af203058c59f_JC.exe 2472 65af203058c59f_JC.exe 2500 install.exe 2500 install.exe 2500 install.exe 2500 install.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2500 2472 65af203058c59f_JC.exe 28 PID 2472 wrote to memory of 2500 2472 65af203058c59f_JC.exe 28 PID 2472 wrote to memory of 2500 2472 65af203058c59f_JC.exe 28 PID 2472 wrote to memory of 2500 2472 65af203058c59f_JC.exe 28 PID 2472 wrote to memory of 2500 2472 65af203058c59f_JC.exe 28 PID 2472 wrote to memory of 2500 2472 65af203058c59f_JC.exe 28 PID 2472 wrote to memory of 2500 2472 65af203058c59f_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\65af203058c59f_JC.exe"C:\Users\Admin\AppData\Local\Temp\65af203058c59f_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files\privileges\install.exe"C:\Program Files\privileges\install.exe" "33201"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD512512eb49771d6a3814f71f270f19813
SHA1d10c13ac08641ff1a2621905db4eb7779497c4c7
SHA256baee2046ef86b4ec74b3d3e1d2c4a5d208120c6730afbc9196ac90c6637c633c
SHA512d2ca738ed935ab2674638623864e1eb40fa4f1d8b239571ee15191fd16df30aad398ce57422e935370431d7c557970f096e23bad142806155822c55a797e83d4
-
Filesize
374KB
MD512512eb49771d6a3814f71f270f19813
SHA1d10c13ac08641ff1a2621905db4eb7779497c4c7
SHA256baee2046ef86b4ec74b3d3e1d2c4a5d208120c6730afbc9196ac90c6637c633c
SHA512d2ca738ed935ab2674638623864e1eb40fa4f1d8b239571ee15191fd16df30aad398ce57422e935370431d7c557970f096e23bad142806155822c55a797e83d4
-
Filesize
374KB
MD512512eb49771d6a3814f71f270f19813
SHA1d10c13ac08641ff1a2621905db4eb7779497c4c7
SHA256baee2046ef86b4ec74b3d3e1d2c4a5d208120c6730afbc9196ac90c6637c633c
SHA512d2ca738ed935ab2674638623864e1eb40fa4f1d8b239571ee15191fd16df30aad398ce57422e935370431d7c557970f096e23bad142806155822c55a797e83d4
-
Filesize
374KB
MD512512eb49771d6a3814f71f270f19813
SHA1d10c13ac08641ff1a2621905db4eb7779497c4c7
SHA256baee2046ef86b4ec74b3d3e1d2c4a5d208120c6730afbc9196ac90c6637c633c
SHA512d2ca738ed935ab2674638623864e1eb40fa4f1d8b239571ee15191fd16df30aad398ce57422e935370431d7c557970f096e23bad142806155822c55a797e83d4
-
Filesize
374KB
MD512512eb49771d6a3814f71f270f19813
SHA1d10c13ac08641ff1a2621905db4eb7779497c4c7
SHA256baee2046ef86b4ec74b3d3e1d2c4a5d208120c6730afbc9196ac90c6637c633c
SHA512d2ca738ed935ab2674638623864e1eb40fa4f1d8b239571ee15191fd16df30aad398ce57422e935370431d7c557970f096e23bad142806155822c55a797e83d4
-
Filesize
374KB
MD512512eb49771d6a3814f71f270f19813
SHA1d10c13ac08641ff1a2621905db4eb7779497c4c7
SHA256baee2046ef86b4ec74b3d3e1d2c4a5d208120c6730afbc9196ac90c6637c633c
SHA512d2ca738ed935ab2674638623864e1eb40fa4f1d8b239571ee15191fd16df30aad398ce57422e935370431d7c557970f096e23bad142806155822c55a797e83d4