Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
Setup-RemoteAppClient.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Setup-RemoteAppClient.exe
Resource
win10v2004-20230915-en
General
-
Target
Setup-RemoteAppClient.exe
-
Size
7.7MB
-
MD5
3a9a2126af4e4911651942ded3912053
-
SHA1
0aaef20576292ea48fde0ba6947b13a86a80c7d0
-
SHA256
1f6058572fddd6b35a03d340e115614d64c963ffc1b73a4a88f219934699ffee
-
SHA512
13e7302005567f9563d1eec1715cb1ca1b09c08bdb24b79a280725960ef341fa2db12cc38b8110df9a954b200d034ce6b17a68834bdf51b5acb9d4dc48da6376
-
SSDEEP
196608:1acJdFhxHtlxK1hS+TcpG1+c4dpG3subKx7hy:1TFLI1hCg+fDuay
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2668 Setup-RemoteAppClient.tmp -
Loads dropped DLL 1 IoCs
pid Process 2176 Setup-RemoteAppClient.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2668 Setup-RemoteAppClient.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2668 2176 Setup-RemoteAppClient.exe 27 PID 2176 wrote to memory of 2668 2176 Setup-RemoteAppClient.exe 27 PID 2176 wrote to memory of 2668 2176 Setup-RemoteAppClient.exe 27 PID 2176 wrote to memory of 2668 2176 Setup-RemoteAppClient.exe 27 PID 2176 wrote to memory of 2668 2176 Setup-RemoteAppClient.exe 27 PID 2176 wrote to memory of 2668 2176 Setup-RemoteAppClient.exe 27 PID 2176 wrote to memory of 2668 2176 Setup-RemoteAppClient.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup-RemoteAppClient.exe"C:\Users\Admin\AppData\Local\Temp\Setup-RemoteAppClient.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\is-TG83D.tmp\Setup-RemoteAppClient.tmp"C:\Users\Admin\AppData\Local\Temp\is-TG83D.tmp\Setup-RemoteAppClient.tmp" /SL5="$40166,7155010,940544,C:\Users\Admin\AppData\Local\Temp\Setup-RemoteAppClient.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2668
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD59debfe936a475df53f3587bb2f2224c5
SHA18040368591f647c15b6670e41bec082db3100b47
SHA2563c70e26e055646494821a0203c81c506953d407f98961dd90647abcd1839bb4a
SHA51235accf83ca82846504faf2836227d5a57751dda227239c37e460eacd662d5b710f656c8d445a6677a93131c6172ce9462fe5643b4c0eab37ecd49471dcb4490f
-
Filesize
3.1MB
MD59debfe936a475df53f3587bb2f2224c5
SHA18040368591f647c15b6670e41bec082db3100b47
SHA2563c70e26e055646494821a0203c81c506953d407f98961dd90647abcd1839bb4a
SHA51235accf83ca82846504faf2836227d5a57751dda227239c37e460eacd662d5b710f656c8d445a6677a93131c6172ce9462fe5643b4c0eab37ecd49471dcb4490f