Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
27d2ab0ec4569dd208d11bf8f8c99c44.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
27d2ab0ec4569dd208d11bf8f8c99c44.exe
Resource
win10v2004-20231201-en
General
-
Target
27d2ab0ec4569dd208d11bf8f8c99c44.exe
-
Size
1.9MB
-
MD5
27d2ab0ec4569dd208d11bf8f8c99c44
-
SHA1
8ca6633429b37c7af9d45b0272d5bbf09151239d
-
SHA256
232279868a157e104f02cfa8a2430e9a81dc09301bde1c6b05761af40dc812c3
-
SHA512
078fd939ed535d6ce02a486184f6991c2ccc523e564c62d771147bb34ab4111b8369093ab11cfe44910a2e4d4d4b86ffb6079b5e768c29b31bcc5f588bf741b5
-
SSDEEP
49152:Qoa1taC070dLLsCd/1//qke/bMkU1FD/wYLrWcUgwYF:Qoa1taC0wl+uTU8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2360 1758.tmp -
Executes dropped EXE 1 IoCs
pid Process 2360 1758.tmp -
Loads dropped DLL 1 IoCs
pid Process 2300 27d2ab0ec4569dd208d11bf8f8c99c44.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2360 2300 27d2ab0ec4569dd208d11bf8f8c99c44.exe 28 PID 2300 wrote to memory of 2360 2300 27d2ab0ec4569dd208d11bf8f8c99c44.exe 28 PID 2300 wrote to memory of 2360 2300 27d2ab0ec4569dd208d11bf8f8c99c44.exe 28 PID 2300 wrote to memory of 2360 2300 27d2ab0ec4569dd208d11bf8f8c99c44.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\27d2ab0ec4569dd208d11bf8f8c99c44.exe"C:\Users\Admin\AppData\Local\Temp\27d2ab0ec4569dd208d11bf8f8c99c44.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\1758.tmp"C:\Users\Admin\AppData\Local\Temp\1758.tmp" --splashC:\Users\Admin\AppData\Local\Temp\27d2ab0ec4569dd208d11bf8f8c99c44.exe EEB957F7220BBA669E26D5D4B9E6087168703BD5BE0D8A105B395C48AEFB5E5E5ACBBB2E84CB823807A72FA6CA83276E95046BCEE08D54B933DE54C3270CC52B2⤵
- Deletes itself
- Executes dropped EXE
PID:2360
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD503736061d5b68fa0a21ac88716a65891
SHA1ea86f66142d61a27b27b164ff1d9a60e2128f069
SHA256af2879cf8d098dd5d6a426b6adccfa3ddee038726808c187a85ea46620a72b70
SHA512649d17c7830bb9074f084c8d6b070863181623e8003b70439abe98e5b72c05a67d096cdb7bc9a5710a8334dcaa183508f7b5bdef94dabcc94b7a64aa87c78102