Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
30/09/2023, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe
Resource
win10v2004-20230915-en
General
-
Target
24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe
-
Size
812KB
-
MD5
5bcbb66ee5d43865205f0469f72b87e8
-
SHA1
70d95b3bdde68cb9fd3666612f383a60eba2d860
-
SHA256
24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362
-
SHA512
404060af7f411010be572a64aef1b860bfd8929df8834a2df8935ec826ca6757f5027771d78adf46641938713efe15faf5bcde4088e7c22fb4d95956f33ac350
-
SSDEEP
12288:VqmytVdB0rPEDb3kCoI641jxy7GHEX2rnAv8MktrOKxp22CMOZ/1Sq:VqxtVfNDb31oT41+aneOrO4p2zMOZ/V
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2588 1C0A0E0F120A156C155A15B0A0A160A0D160C.exe -
Loads dropped DLL 2 IoCs
pid Process 2412 24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe 2412 24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2412 24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe 2588 1C0A0E0F120A156C155A15B0A0A160A0D160C.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2588 2412 24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe 28 PID 2412 wrote to memory of 2588 2412 24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe 28 PID 2412 wrote to memory of 2588 2412 24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe 28 PID 2412 wrote to memory of 2588 2412 24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe"C:\Users\Admin\AppData\Local\Temp\24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\1C0A0E0F120A156C155A15B0A0A160A0D160C.exeC:\Users\Admin\AppData\Local\Temp\1C0A0E0F120A156C155A15B0A0A160A0D160C.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2588
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
812KB
MD523efff4279ff3f03a6b2497dc50bc835
SHA1135952835203c2cab3a36dcc19a42a12cf31a28b
SHA2568b36fb7e00bae66be8fb72dad100913bbc59e79e7336496098c2ece14a7bf29c
SHA512bc80bf5678c79720c225df7de9880e019b75262f6628dc9f561b67c676be574d8e01a67b9c94a3be1baf472f0d988a9e39cc0fc2c6eb01e2d57892efc2f6bba5
-
Filesize
812KB
MD523efff4279ff3f03a6b2497dc50bc835
SHA1135952835203c2cab3a36dcc19a42a12cf31a28b
SHA2568b36fb7e00bae66be8fb72dad100913bbc59e79e7336496098c2ece14a7bf29c
SHA512bc80bf5678c79720c225df7de9880e019b75262f6628dc9f561b67c676be574d8e01a67b9c94a3be1baf472f0d988a9e39cc0fc2c6eb01e2d57892efc2f6bba5
-
Filesize
812KB
MD523efff4279ff3f03a6b2497dc50bc835
SHA1135952835203c2cab3a36dcc19a42a12cf31a28b
SHA2568b36fb7e00bae66be8fb72dad100913bbc59e79e7336496098c2ece14a7bf29c
SHA512bc80bf5678c79720c225df7de9880e019b75262f6628dc9f561b67c676be574d8e01a67b9c94a3be1baf472f0d988a9e39cc0fc2c6eb01e2d57892efc2f6bba5
-
Filesize
812KB
MD523efff4279ff3f03a6b2497dc50bc835
SHA1135952835203c2cab3a36dcc19a42a12cf31a28b
SHA2568b36fb7e00bae66be8fb72dad100913bbc59e79e7336496098c2ece14a7bf29c
SHA512bc80bf5678c79720c225df7de9880e019b75262f6628dc9f561b67c676be574d8e01a67b9c94a3be1baf472f0d988a9e39cc0fc2c6eb01e2d57892efc2f6bba5