Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
12/12/2023, 16:30
Behavioral task
behavioral1
Sample
973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe
Resource
win10v2004-20231127-en
General
-
Target
973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe
-
Size
8.2MB
-
MD5
403a9a2f73f2c8a287dc2b5c70e12325
-
SHA1
b5dc251e67f796146095e1dbf8f47755ddeb48d9
-
SHA256
973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411
-
SHA512
fd1910f38bf7aadb2b6844f09474f8423d5c7e834d0e27f2c46bea9c0766fca048dade92854479d15a9077293bbd1b5aea1fbe411f9c5d266deacd831f629d9b
-
SSDEEP
196608:BihEzpC0ULjv+bhqNVoB8Ck5c7GpNlpq41J2mrl0bk9qtlDfJh:y4AL+9qz88Ck+7q3p91JNRqfL
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 1660 973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe 1660 973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe 1660 973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe 1660 973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe 1660 973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe 1660 973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe 1660 973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe -
resource yara_rule behavioral1/files/0x0006000000018b39-72.dat upx behavioral1/memory/1660-74-0x000007FEF5FE0000-0x000007FEF66B8000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2516 wrote to memory of 1660 2516 973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe 28 PID 2516 wrote to memory of 1660 2516 973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe 28 PID 2516 wrote to memory of 1660 2516 973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe"C:\Users\Admin\AppData\Local\Temp\973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe"C:\Users\Admin\AppData\Local\Temp\973727e4a8c5fe3b5d87f0cf30938f4312e8181a60e3b6550999ded87c6bf411.exe"2⤵
- Loads dropped DLL
PID:1660
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD57f14fd0436c066a8b40e66386ceb55d0
SHA1288c020fb12a4d8c65ed22a364b5eb8f4126a958
SHA256c78eab8e057bddd55f998e72d8fdf5b53d9e9c8f67c8b404258e198eb2cdcf24
SHA512d04adc52ee0ceed4131eb1d133bfe9a66cbc0f88900270b596116064480afe6ae6ca42feb0eaed54cb141987f2d7716bb2dae947a025014d05d7aa0b0821dc50
-
Filesize
15KB
MD571457fd15de9e0b3ad83b4656cad2870
SHA1c9c2caf4f9e87d32a93a52508561b4595617f09f
SHA256db970725b36cc78ef2e756ff4b42db7b5b771bfd9d106486322cf037115bd911
SHA512a10fcf1d7637effff0ae3e3b4291d54cc7444d985491e82b3f4e559fbb0dbb3b6231a8c689ff240a5036a7acae47421cda58aaa6938374d4b84893cce0077bc8
-
Filesize
13KB
MD5e93816c04327730d41224e7a1ba6dc51
SHA13f83b9fc6291146e58afce5b5447cd6d2f32f749
SHA256ca06ccf12927ca52d8827b3a36b23b6389c4c6d4706345e2d70b895b79ff2ec8
SHA512beaab5a12bfc4498cdf67d8b560ef0b0e2451c5f4634b6c5780a857666fd14f8a379f42e38be1beefa1c3578b2df913d901b271719ac6794bfaab0731bb77bca
-
Filesize
13KB
MD5acf40d5e6799231cf7e4026bad0c50a0
SHA18f0395b7e7d2aac02130f47b23b50d1eab87466b
SHA25664b5b95fe56b6df4c2d47d771bec32bd89267605df736e08c1249b802d6d48d1
SHA512f66a61e89231b6dc95b26d97f5647da42400bc809f70789b9afc00a42b94ea3487913860b69a1b0ee59ed5eb62c3a0cade9e21f95da35fdd42d8ce51c5507632
-
Filesize
1.8MB
MD52f1072ddd9a88629205e7434ed055b3e
SHA120da3188dabe3d5fa33b46bfe671e713e6fa3056
SHA256d086257a6b36047f35202266c8eb8c1225163bd96b064d31b80f0dbe13da2acf
SHA512d8dddc30733811ed9a9c4ae83ac8f3fc4d8ba3fa8051d95242fbd432fd5bf24122373ac5eea9fec78f0daf7c1133365f519a13cf3f105636da74820a00a25e9b
-
Filesize
994KB
MD58e7680a8d07c3c4159241d31caaf369c
SHA162fe2d4ae788ee3d19e041d81696555a6262f575
SHA25636cc22d92a60e57dee394f56a9d1ed1655ee9db89d2244a959005116a4184d80
SHA5129509f5b07588a08a490f4c3cb859bbfe670052c1c83f92b9c3356afa664cb500364e09f9dafac7d387332cc52d9bb7bb84ceb1493f72d4d17ef08b9ee3cb4174
-
Filesize
12KB
MD549e3260ae3f973608f4d4701eb97eb95
SHA1097e7d56c3514a3c7dc17a9c54a8782c6d6c0a27
SHA256476fbad616e20312efc943927ade1a830438a6bebb1dd1f83d2370e5343ea7af
SHA512df22cf16490faa0dc809129ca32eaf1a16ec665f9c5411503ce0153270de038e5d3be1e0e49879a67043a688f6c42bdb5a9a6b3cea43bf533eba087e999be653