Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
06e850a961a64f2bb5bb983bc8ae84ad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06e850a961a64f2bb5bb983bc8ae84ad.exe
Resource
win10v2004-20231215-en
General
-
Target
06e850a961a64f2bb5bb983bc8ae84ad.exe
-
Size
1.9MB
-
MD5
06e850a961a64f2bb5bb983bc8ae84ad
-
SHA1
8755b9297ade149ba56372356a5761ac1fa6567e
-
SHA256
d7016b4118dce6a43e518adc95cdbbecdf480a54111a0d942daa8b6d81e54c84
-
SHA512
6e0e11b24ef2d62175e4446f895cff960790f61145003a1f52afab0dcfba39813d13345b53547b0ac2aa74e1f4499a75e101040041f3ed7bcc40bb7a8add1cf9
-
SSDEEP
49152:Qoa1taC070da6E3vjy2/vhBPy8PWrky7g:Qoa1taC0QEfjNhHWrky7g
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2372 8A8.tmp -
Executes dropped EXE 1 IoCs
pid Process 2372 8A8.tmp -
Loads dropped DLL 1 IoCs
pid Process 1684 06e850a961a64f2bb5bb983bc8ae84ad.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2372 1684 06e850a961a64f2bb5bb983bc8ae84ad.exe 28 PID 1684 wrote to memory of 2372 1684 06e850a961a64f2bb5bb983bc8ae84ad.exe 28 PID 1684 wrote to memory of 2372 1684 06e850a961a64f2bb5bb983bc8ae84ad.exe 28 PID 1684 wrote to memory of 2372 1684 06e850a961a64f2bb5bb983bc8ae84ad.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\06e850a961a64f2bb5bb983bc8ae84ad.exe"C:\Users\Admin\AppData\Local\Temp\06e850a961a64f2bb5bb983bc8ae84ad.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\8A8.tmp"C:\Users\Admin\AppData\Local\Temp\8A8.tmp" --splashC:\Users\Admin\AppData\Local\Temp\06e850a961a64f2bb5bb983bc8ae84ad.exe 5B5F4740063AF287ACCC10AC9CB70033029D0BFD632AB7C1CCECC4963F419629C46BFE340CF2F28AF99FE8FB227A62BA3D1904C1268BC495B8775D5B134CD33F2⤵
- Deletes itself
- Executes dropped EXE
PID:2372
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD58a9b1579070bd1ae883c0e50114fb7db
SHA1c755c673708edf4d85e44bb86fbd72df550e9951
SHA2565c18771395826966dccfb08a3f30c9fb24f9a21412057aa50154c2bcb2d74372
SHA512cee9cef4e4b0d1eb95ab3d09b577f68b622eaec8ba63dc39521ef52b9eb902baff0ccd0352433c2508214b4059e58cebbaf2d5e503ce81aba9c9ee2c3cc9eae3
-
Filesize
103KB
MD5d307ea91490692bea9a250b0bc52b017
SHA11af37122c72b199c6dc954eabc5d5d381b53f766
SHA2568e5f176f235f87c055c8310eea44f1227ec9c74fac04c3896e4b6341e6c00531
SHA512484ffee45b43775a9506fbc36db52de3a9321657cd958c7050b6c4313e394d3807d315f3459280d8502eecf3321f58204f0ed117dcc511b218c1942905cdc48c