Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2023, 12:52

General

  • Target

    75f3442c06118878ae8e96715f191863fc327a0f42be996ad7554fe48be39575.exe

  • Size

    14KB

  • MD5

    c47e82f4d66cca186744c474485d8ffe

  • SHA1

    98943c9779d6258ea68fcfe72259b72a853fc385

  • SHA256

    75f3442c06118878ae8e96715f191863fc327a0f42be996ad7554fe48be39575

  • SHA512

    f6edc3d0e31135aa00a22f0db55b40971ec41a68dd9dcabb700421907c5c26e96abe62445cde2724c622ad30bf18addd5b954bc4c9cd134143dd55c08b240206

  • SSDEEP

    192:zOSQ95Iurheh0sLcAY7qjuoBCgP3Q5tfwcANffmPD:zlQ95IutanYAgqHfP3L9GD

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75f3442c06118878ae8e96715f191863fc327a0f42be996ad7554fe48be39575.exe
    "C:\Users\Admin\AppData\Local\Temp\75f3442c06118878ae8e96715f191863fc327a0f42be996ad7554fe48be39575.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Windows\system32\cmd.exe
      cmd.exe /c echo 73746172742063616C632E657865 > 1.txt && certutil -decodehex 1.txt fi.bat && fi.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Windows\system32\certutil.exe
        certutil -decodehex 1.txt fi.bat
        3⤵
          PID:1988
        • C:\Windows\system32\calc.exe
          calc.exe
          3⤵
            PID:2364

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\1.txt

        Filesize

        32B

        MD5

        48a4151336002ddd524facc07cb44bfd

        SHA1

        e53362bae6ee1f87255ffcd178cadc85155b14ea

        SHA256

        eeef85989ea117c38b3cca39a6700af6e99c24fad31ed95245ad2a2b18bf4dd4

        SHA512

        c3b42015664722b7c75e7cfcbe3c4c368a23d6152ae5eedd2502c6d2873a117d2283b508d95fae34fbfdd9bbcf3ff0c81127635ab7bf82ef25c76aa5f3eec306

      • C:\Users\Admin\AppData\Local\Temp\fi.bat

        Filesize

        14B

        MD5

        f107dfd43fe353c31476941723bd19e2

        SHA1

        48cb709699652ff5e8a5c1f4e7756fa9c76aba43

        SHA256

        bd49877b5fc35864a9e9ddf6937779458bb834f6be4d129cd7f35b666b6420f2

        SHA512

        8611aec51f10be2c2bcf885e9e25ed4ea4801046c3f59da0ee3845f0a888b6ae223513180328982c5d3cde1448c9e702975d9b7f372f4a7fe1d450a76f83bba4

      • memory/1892-0-0x00000000001D0000-0x00000000001D1000-memory.dmp

        Filesize

        4KB