Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe
Resource
win10v2004-20230915-en
General
-
Target
44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe
-
Size
2.4MB
-
MD5
ac7986b52bc828e71593f9ee004a8fb5
-
SHA1
3d16eb3d68d6d57795fc31c824586d73bdfc72c9
-
SHA256
44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de
-
SHA512
e8a6c073ce831c9621131f82e3b13d7422d44980106fcc0697488f08a39ec3035556654c64638b9789d38763f6c16b67af158ffd098f8f3a51cec190ee56d6a1
-
SSDEEP
49152:wM6vlNPvJ4GCQGZ21C/pB+NmeMyPDbvyPgCLJxmY1YawKzPofGpsqq:P69lJ4GR1JNmxyPvggC3L1YaXsfOsqq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2268 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.tmp -
Loads dropped DLL 3 IoCs
pid Process 1976 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe 2268 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.tmp 2268 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2268 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2268 1976 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe 28 PID 1976 wrote to memory of 2268 1976 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe 28 PID 1976 wrote to memory of 2268 1976 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe 28 PID 1976 wrote to memory of 2268 1976 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe 28 PID 1976 wrote to memory of 2268 1976 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe 28 PID 1976 wrote to memory of 2268 1976 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe 28 PID 1976 wrote to memory of 2268 1976 44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe"C:\Users\Admin\AppData\Local\Temp\44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\is-T54OE.tmp\44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.tmp"C:\Users\Admin\AppData\Local\Temp\is-T54OE.tmp\44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.tmp" /SL5="$7011E,2233551,56832,C:\Users\Admin\AppData\Local\Temp\44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2268
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-T54OE.tmp\44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.tmp
Filesize690KB
MD51305181de520f125aeabf85dc24a89d6
SHA198b7548fede3f1468ccbdee405abdc4e5d2ec671
SHA2560e19765b89a1a29afee09810dcb3ec5cc7c66053947be8f1aebdbb7c801dfeaf
SHA512b0bfa9749a6a5a18c1926e6c5ebb4cdb156df1652cb822f067422a1cd21583340f32e4a1fc2f4c21a09343d73a55651972edbd2dec98ce44641a1097c16bc793
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-T54OE.tmp\44eb4845c9ad4e2a4639c82d880cdc0b02b4859f6f0f5bdec5b9ce061f4305de.tmp
Filesize690KB
MD51305181de520f125aeabf85dc24a89d6
SHA198b7548fede3f1468ccbdee405abdc4e5d2ec671
SHA2560e19765b89a1a29afee09810dcb3ec5cc7c66053947be8f1aebdbb7c801dfeaf
SHA512b0bfa9749a6a5a18c1926e6c5ebb4cdb156df1652cb822f067422a1cd21583340f32e4a1fc2f4c21a09343d73a55651972edbd2dec98ce44641a1097c16bc793