Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:31
Behavioral task
behavioral1
Sample
a4da8f3883e8ba6fdb295a095b1a748a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a4da8f3883e8ba6fdb295a095b1a748a.exe
Resource
win10v2004-20231215-en
General
-
Target
a4da8f3883e8ba6fdb295a095b1a748a.exe
-
Size
2.7MB
-
MD5
a4da8f3883e8ba6fdb295a095b1a748a
-
SHA1
6035a525d7f7356bd9bc9a094f40881ea3202de2
-
SHA256
17cffb5fdd921e8c289030a5aa1bb9da17d2b071ba677634e5353f97b6a19186
-
SHA512
a2c8e71d5aad021152164ce922d5bfee1151721676defd8093d5f7e2d19587f315245b825f33d4164243f9473b029c12acfa9499e721166c475a5f9debf27309
-
SSDEEP
49152:jMN91ZL5hv+qSvqJHdOljmtePuQ2zgG1ZFBOtHf2nG:ju9fvmyJoltuQGOK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2016 a4da8f3883e8ba6fdb295a095b1a748a.exe -
Executes dropped EXE 1 IoCs
pid Process 2016 a4da8f3883e8ba6fdb295a095b1a748a.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 a4da8f3883e8ba6fdb295a095b1a748a.exe -
resource yara_rule behavioral1/memory/2204-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000a000000012238-11.dat upx behavioral1/memory/2016-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2204 a4da8f3883e8ba6fdb295a095b1a748a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2204 a4da8f3883e8ba6fdb295a095b1a748a.exe 2016 a4da8f3883e8ba6fdb295a095b1a748a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2016 2204 a4da8f3883e8ba6fdb295a095b1a748a.exe 28 PID 2204 wrote to memory of 2016 2204 a4da8f3883e8ba6fdb295a095b1a748a.exe 28 PID 2204 wrote to memory of 2016 2204 a4da8f3883e8ba6fdb295a095b1a748a.exe 28 PID 2204 wrote to memory of 2016 2204 a4da8f3883e8ba6fdb295a095b1a748a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4da8f3883e8ba6fdb295a095b1a748a.exe"C:\Users\Admin\AppData\Local\Temp\a4da8f3883e8ba6fdb295a095b1a748a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\a4da8f3883e8ba6fdb295a095b1a748a.exeC:\Users\Admin\AppData\Local\Temp\a4da8f3883e8ba6fdb295a095b1a748a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2016
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD586842c7852ac8768c3dbd1110418e1a1
SHA130bde77f0ff2200c18118d4e3d2124bdf3ed1815
SHA2568939c4bc52097a757652b1d9a7c7c78bdc0303b2825828cfb733814f68359a25
SHA5128f8c949b83e92c305b42870c7a24d136a0a2fd3eedc5d6c29433d2c7be323197848096290161472455332e630ebe0b74305c73ff56308e124d5e905a99a95fff