Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:08
Behavioral task
behavioral1
Sample
b7cc7a5438d8267a93ab98dead6c19cf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b7cc7a5438d8267a93ab98dead6c19cf.exe
Resource
win10v2004-20231215-en
General
-
Target
b7cc7a5438d8267a93ab98dead6c19cf.exe
-
Size
133KB
-
MD5
b7cc7a5438d8267a93ab98dead6c19cf
-
SHA1
996b2e78387c97a2cdb32ea7ca4d6302bbc78a22
-
SHA256
d36c5c5e9b36fbba64e0d4201eb78374f09f1a0a1371877e673b58c354151349
-
SHA512
1b23702adc4f977a0a3259102e8878ba5599a929dd070dc2a159c8bc2fd0a82d6ff1e965705287413041d1c8a27e31438ec70a6556f0d25edeedbf552800bf61
-
SSDEEP
3072:XI/IEKfLNAaIuZnSTLnlwzxFc1+dimRmqHMKiaXzCuYxXiGiQ:Y/TKfSaIu9cLwxOMImDL/YpiGiQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3068 b7cc7a5438d8267a93ab98dead6c19cf.exe -
Executes dropped EXE 1 IoCs
pid Process 3068 b7cc7a5438d8267a93ab98dead6c19cf.exe -
Loads dropped DLL 1 IoCs
pid Process 2172 b7cc7a5438d8267a93ab98dead6c19cf.exe -
resource yara_rule behavioral1/memory/2172-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/memory/2172-13-0x0000000000370000-0x00000000003F6000-memory.dmp upx behavioral1/files/0x000a000000012247-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2172 b7cc7a5438d8267a93ab98dead6c19cf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2172 b7cc7a5438d8267a93ab98dead6c19cf.exe 3068 b7cc7a5438d8267a93ab98dead6c19cf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3068 2172 b7cc7a5438d8267a93ab98dead6c19cf.exe 29 PID 2172 wrote to memory of 3068 2172 b7cc7a5438d8267a93ab98dead6c19cf.exe 29 PID 2172 wrote to memory of 3068 2172 b7cc7a5438d8267a93ab98dead6c19cf.exe 29 PID 2172 wrote to memory of 3068 2172 b7cc7a5438d8267a93ab98dead6c19cf.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7cc7a5438d8267a93ab98dead6c19cf.exe"C:\Users\Admin\AppData\Local\Temp\b7cc7a5438d8267a93ab98dead6c19cf.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\b7cc7a5438d8267a93ab98dead6c19cf.exeC:\Users\Admin\AppData\Local\Temp\b7cc7a5438d8267a93ab98dead6c19cf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3068
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5fa071083d61dd0bbe3fb954f1470ccaa
SHA1b8bdc126842648e331afd3572e2022238dd0d6d6
SHA256771a19e630992e2afaed42eca773c137f24844f7a5716590c37b9a7f87b3ecb3
SHA5120ab1fd3a1a1c8aad0373b2ef921e822dd0547024f4263ba856727806b6da977ada3075cd5f05b62d92175d049df1cc004000c6ab54780bfa37094fd115036117