Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2023, 11:42

General

  • Target

    bypass-clm-nosima.exe

  • Size

    6KB

  • MD5

    8d0341f8064ddc9eb5049dea94c33ac0

  • SHA1

    2a147a622b372ca9b9dc591328ac457339b3e04a

  • SHA256

    280e7679164432d2e07bc57f9bbe58129c8338ccbc90bc950657c275fef13539

  • SHA512

    777ec31457c0633f219cf6fda9cc18a3e4d5147184292f38170ed2690ec9acf193aca9ae61a8aecf85760bcf9a4d01c22cece42a2cb7a32e60250ada2c8ee3e6

  • SSDEEP

    96:m/j90G/MzVEsxBgnlT3+eYflrkKIMbX+l9rzNt:mr9g2DnV+npjbXI9t

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bypass-clm-nosima.exe
    "C:\Users\Admin\AppData\Local\Temp\bypass-clm-nosima.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1664 -s 528
      2⤵
        PID:2428

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1664-0-0x000000013F180000-0x000000013F186000-memory.dmp

      Filesize

      24KB

    • memory/1664-1-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

      Filesize

      9.9MB

    • memory/1664-2-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

      Filesize

      9.9MB