Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 12:01
Behavioral task
behavioral1
Sample
8a9d11140551f2f5e423f898c1d5c123.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8a9d11140551f2f5e423f898c1d5c123.exe
Resource
win10v2004-20231215-en
General
-
Target
8a9d11140551f2f5e423f898c1d5c123.exe
-
Size
2.7MB
-
MD5
8a9d11140551f2f5e423f898c1d5c123
-
SHA1
11fa75d6004d94c80096f8095592aed71044c34f
-
SHA256
338fd831f6ef2966fa7a0cf3738d4238f32873ff3f8945f362da7ca2dc9d5988
-
SHA512
75f5b81bced85901b074234e29b6b7f80158d391f8ff3cfaae4f2873edcbc7215d64dba229aecf90a1deed9b9c8c8dc959024a327346d1be12d321ba4646d48a
-
SSDEEP
49152:OcqXBi2eamdH1dcIS1/tBNHMyrpehP61R92pnfodBmVSeiWujuJPcrSwGSa9R9j:GXsT/2N1xvpQP61HAnCBpeUj7SwGSKHj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1948 8a9d11140551f2f5e423f898c1d5c123.exe -
Executes dropped EXE 1 IoCs
pid Process 1948 8a9d11140551f2f5e423f898c1d5c123.exe -
Loads dropped DLL 1 IoCs
pid Process 1848 8a9d11140551f2f5e423f898c1d5c123.exe -
resource yara_rule behavioral1/memory/1848-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/memory/1948-17-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x000b0000000126e7-13.dat upx behavioral1/files/0x000b0000000126e7-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1848 8a9d11140551f2f5e423f898c1d5c123.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1848 8a9d11140551f2f5e423f898c1d5c123.exe 1948 8a9d11140551f2f5e423f898c1d5c123.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1948 1848 8a9d11140551f2f5e423f898c1d5c123.exe 28 PID 1848 wrote to memory of 1948 1848 8a9d11140551f2f5e423f898c1d5c123.exe 28 PID 1848 wrote to memory of 1948 1848 8a9d11140551f2f5e423f898c1d5c123.exe 28 PID 1848 wrote to memory of 1948 1848 8a9d11140551f2f5e423f898c1d5c123.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a9d11140551f2f5e423f898c1d5c123.exe"C:\Users\Admin\AppData\Local\Temp\8a9d11140551f2f5e423f898c1d5c123.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\8a9d11140551f2f5e423f898c1d5c123.exeC:\Users\Admin\AppData\Local\Temp\8a9d11140551f2f5e423f898c1d5c123.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1948
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD59826b5e7c14522ec03c5de7b509561ff
SHA1db7ccaebc8323b93d3cc5f2e155a9c5fa98adfed
SHA25689535d12757a8020b12419e9e15abbd7c189e67e81ddff84489f11c9ece28c88
SHA51291abdc4e89a0e696a876439c3eaf1dff661a90da55c65a177facf2e898775777873ecc97de9033cacd7fafe1adcf2c23b27e3f47e7dc7e17df79b6b3f154aec6
-
Filesize
320KB
MD5874953d7e3280025f662e9a3f3e617cf
SHA151f6972b79aea02105d3fcddca6715747a388501
SHA256b9a8290813bc66b6d5ee286af03e495dbb5ed5edf72dd38f1c6dfee9d26b35ab
SHA512fd8774acf2cd2cdd627e27970748eed9d7d59e9c60d778eb4ab4f8207ca96b77a3a6439f3a56160f2b58b1c1c66fb1ee743dfba7710f55c9c1a4d1993f2c4998