Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10-20230915-en
Behavioral task
behavioral3
Sample
tmp.exe
Resource
win10v2004-20230915-en
General
-
Target
tmp.exe
-
Size
2.7MB
-
MD5
c0ac13d00f939d24df4ed4e9e1ab21fb
-
SHA1
2e4f8d8427a15607e9ba9a7e969416bae5a2ea8c
-
SHA256
5f69521a094571ab662fe965626502dd9762b5ca74b78085eeb51b2f0447855c
-
SHA512
19cdfac28d3994b0c3841631371b210501812ac806aae4398adb369a0a1ff1f3f2afff8c541e1b1fc1884fdc49b386a58fdae29d31b5e33fabce383fb994702e
-
SSDEEP
49152:nCoOyER2D8J6eoR0SY6kn5U3IePCQOiMDTAWK8+zUCCIulWX/8/fmDJo:CAERGLmvHn5U3Ie+lEQf16uf0Jo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2368 tmp.tmp -
Loads dropped DLL 3 IoCs
pid Process 1200 tmp.exe 2368 tmp.tmp 2368 tmp.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2368 tmp.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2368 1200 tmp.exe 27 PID 1200 wrote to memory of 2368 1200 tmp.exe 27 PID 1200 wrote to memory of 2368 1200 tmp.exe 27 PID 1200 wrote to memory of 2368 1200 tmp.exe 27 PID 1200 wrote to memory of 2368 1200 tmp.exe 27 PID 1200 wrote to memory of 2368 1200 tmp.exe 27 PID 1200 wrote to memory of 2368 1200 tmp.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\is-OT68K.tmp\tmp.tmp"C:\Users\Admin\AppData\Local\Temp\is-OT68K.tmp\tmp.tmp" /SL5="$4014C,2388918,119296,C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2368
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD56a96bef4679e16a54b4090e74664dcca
SHA1c8631c1624b98f6709b1ac37ce3956faed29bc30
SHA256cb095356ddcfcbace96c6252fb73a267ed011c15ff206a7a9302007baa68a783
SHA512924ab1e5c6ea72342eab6e78899a56c415e90020c46d3d8a81ae4da9276db7ea1df9684965a81fb95a6f2f9cf103b31413d67770eb15725ad04198c5d00037d0
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
1.1MB
MD56a96bef4679e16a54b4090e74664dcca
SHA1c8631c1624b98f6709b1ac37ce3956faed29bc30
SHA256cb095356ddcfcbace96c6252fb73a267ed011c15ff206a7a9302007baa68a783
SHA512924ab1e5c6ea72342eab6e78899a56c415e90020c46d3d8a81ae4da9276db7ea1df9684965a81fb95a6f2f9cf103b31413d67770eb15725ad04198c5d00037d0