Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 14:50
Behavioral task
behavioral1
Sample
Activator/ConsoleAct_2.3.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Activator/ConsoleAct_2.3.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
Activator/Microsoft_Toolkit_2.6.4.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Activator/Microsoft_Toolkit_2.6.4.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
Activator/W10_Digital_Activation_1.3.7.exe
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
Activator/W10_Digital_Activation_1.3.7.exe
Resource
win10v2004-20231020-en
General
-
Target
Activator/ConsoleAct_2.3.exe
-
Size
856KB
-
MD5
e5b2c576f778dbfd501d7b3dc29d1c89
-
SHA1
0d7a583ace8a0c598dde33b0b4fc8c3b74111fbd
-
SHA256
3bb2533f9465a9c3e8e0c4491a194fe139aefb0c75e91537fb2b1b59e66ec43a
-
SHA512
dfbbff1cdef6412a448a4ea63796c3e09dc25bbbb163a9c1da38342478c2c31f2b7e4f6b184fb52b841c0540b859f871b3e3001bf8132fc6fcd81f6f57911aab
-
SSDEEP
24576:nJr6ro7aR6pqUxfop9228fRrcoH3y/+3fT92:nJrb7aYYUx02227y/+PTU
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1404 Process not Found -
resource yara_rule behavioral1/memory/2864-0-0x0000000140000000-0x00000001401E4000-memory.dmp upx behavioral1/files/0x000a000000015e3c-1.dat upx behavioral1/memory/2864-2-0x0000000140000000-0x00000001401E4000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2780 2864 ConsoleAct_2.3.exe 29 PID 2864 wrote to memory of 2780 2864 ConsoleAct_2.3.exe 29 PID 2864 wrote to memory of 2780 2864 ConsoleAct_2.3.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Activator\ConsoleAct_2.3.exe"C:\Users\Admin\AppData\Local\Temp\Activator\ConsoleAct_2.3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Windows\System32\Tasks\ConsoleAct "C:\Users\Admin\AppData\Local\Temp\ConsoleAct.tmp" /Y 2>&12⤵PID:2780
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
856KB
MD5e5b2c576f778dbfd501d7b3dc29d1c89
SHA10d7a583ace8a0c598dde33b0b4fc8c3b74111fbd
SHA2563bb2533f9465a9c3e8e0c4491a194fe139aefb0c75e91537fb2b1b59e66ec43a
SHA512dfbbff1cdef6412a448a4ea63796c3e09dc25bbbb163a9c1da38342478c2c31f2b7e4f6b184fb52b841c0540b859f871b3e3001bf8132fc6fcd81f6f57911aab