Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
893f957381cfe0a589fc30ce7f0f426e6ea964e46a22bb32d77a4d78c876110f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
893f957381cfe0a589fc30ce7f0f426e6ea964e46a22bb32d77a4d78c876110f.exe
Resource
win10v2004-20230915-en
General
-
Target
893f957381cfe0a589fc30ce7f0f426e6ea964e46a22bb32d77a4d78c876110f.exe
-
Size
812KB
-
MD5
9b2e5e35b30921d711682e78e04ffb4f
-
SHA1
2ba14626f620999cc1769eb799cb414c4b6878b8
-
SHA256
893f957381cfe0a589fc30ce7f0f426e6ea964e46a22bb32d77a4d78c876110f
-
SHA512
bfa60586ee091c290bc313a2e7123afa3898c4a98abfce46e2830a47c1092ed241e52efe84c9ad70a6bbbd72041c2c2e99c3a9d8922366be8e08a335d0cdf93c
-
SSDEEP
12288:9qmytVdB0rPEDb3kCoI641jxy7GHEX2rnAv8MktrOKxp22CMOZ/1Sq:9qxtVfNDb31oT41+aneOrO4p2zMOZ/V
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2584 1E0D0A0C120D156B155F15B0E0F160E0E160F.exe -
Loads dropped DLL 2 IoCs
pid Process 1744 893f957381cfe0a589fc30ce7f0f426e6ea964e46a22bb32d77a4d78c876110f.exe 1744 893f957381cfe0a589fc30ce7f0f426e6ea964e46a22bb32d77a4d78c876110f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1744 893f957381cfe0a589fc30ce7f0f426e6ea964e46a22bb32d77a4d78c876110f.exe 2584 1E0D0A0C120D156B155F15B0E0F160E0E160F.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2584 1744 893f957381cfe0a589fc30ce7f0f426e6ea964e46a22bb32d77a4d78c876110f.exe 28 PID 1744 wrote to memory of 2584 1744 893f957381cfe0a589fc30ce7f0f426e6ea964e46a22bb32d77a4d78c876110f.exe 28 PID 1744 wrote to memory of 2584 1744 893f957381cfe0a589fc30ce7f0f426e6ea964e46a22bb32d77a4d78c876110f.exe 28 PID 1744 wrote to memory of 2584 1744 893f957381cfe0a589fc30ce7f0f426e6ea964e46a22bb32d77a4d78c876110f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\893f957381cfe0a589fc30ce7f0f426e6ea964e46a22bb32d77a4d78c876110f.exe"C:\Users\Admin\AppData\Local\Temp\893f957381cfe0a589fc30ce7f0f426e6ea964e46a22bb32d77a4d78c876110f.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\1E0D0A0C120D156B155F15B0E0F160E0E160F.exeC:\Users\Admin\AppData\Local\Temp\1E0D0A0C120D156B155F15B0E0F160E0E160F.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2584
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
812KB
MD59cf58efe01c1430d0dae97853c1c68f0
SHA16ba84c6fb1b0e63aaf06d132c4e293cfeacb5f8c
SHA2568d432ff1c526f62e1362d1bfae865d582a4f6b59802713d86ac77b8626e690d9
SHA512d5ae0e2c5cda7ce8d9cbc8cd293e750dd2116eaaabd2d6d2cc04f7326378730a3913eb5ef3f04b003e3143db686cf2f7e7b6e109941d5283522fa2c492ae1d51
-
Filesize
812KB
MD59cf58efe01c1430d0dae97853c1c68f0
SHA16ba84c6fb1b0e63aaf06d132c4e293cfeacb5f8c
SHA2568d432ff1c526f62e1362d1bfae865d582a4f6b59802713d86ac77b8626e690d9
SHA512d5ae0e2c5cda7ce8d9cbc8cd293e750dd2116eaaabd2d6d2cc04f7326378730a3913eb5ef3f04b003e3143db686cf2f7e7b6e109941d5283522fa2c492ae1d51
-
Filesize
812KB
MD59cf58efe01c1430d0dae97853c1c68f0
SHA16ba84c6fb1b0e63aaf06d132c4e293cfeacb5f8c
SHA2568d432ff1c526f62e1362d1bfae865d582a4f6b59802713d86ac77b8626e690d9
SHA512d5ae0e2c5cda7ce8d9cbc8cd293e750dd2116eaaabd2d6d2cc04f7326378730a3913eb5ef3f04b003e3143db686cf2f7e7b6e109941d5283522fa2c492ae1d51
-
Filesize
812KB
MD59cf58efe01c1430d0dae97853c1c68f0
SHA16ba84c6fb1b0e63aaf06d132c4e293cfeacb5f8c
SHA2568d432ff1c526f62e1362d1bfae865d582a4f6b59802713d86ac77b8626e690d9
SHA512d5ae0e2c5cda7ce8d9cbc8cd293e750dd2116eaaabd2d6d2cc04f7326378730a3913eb5ef3f04b003e3143db686cf2f7e7b6e109941d5283522fa2c492ae1d51