Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 15:06
Behavioral task
behavioral1
Sample
d1b366ba2b2720db8d9967dadcefd252.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d1b366ba2b2720db8d9967dadcefd252.exe
Resource
win10v2004-20231215-en
General
-
Target
d1b366ba2b2720db8d9967dadcefd252.exe
-
Size
2.7MB
-
MD5
d1b366ba2b2720db8d9967dadcefd252
-
SHA1
6adbbc4ce937b9a844ba593d4aa009600ea1f3cc
-
SHA256
3e8eb24770d2d3281550209f567d98f3e8fa654c245efb186f2e416f2c59fad7
-
SHA512
2d7a3b5c27da232b87c5f001a70dce766c91ebc08501871e8f790cd662ec04623d449d418112a6688b495c81e477a4937c22f5cc02f6ab6e8e82d422c56fbdfc
-
SSDEEP
49152:K8g7or+6RjF9GFAnANjcNCpGz1D0kQGduCjfpBDruSZPu:K80u+s59yAKjWSipduCjxBDruSZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2436 d1b366ba2b2720db8d9967dadcefd252.exe -
Executes dropped EXE 1 IoCs
pid Process 2436 d1b366ba2b2720db8d9967dadcefd252.exe -
Loads dropped DLL 1 IoCs
pid Process 2852 d1b366ba2b2720db8d9967dadcefd252.exe -
resource yara_rule behavioral1/memory/2852-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000e000000012232-11.dat upx behavioral1/memory/2436-16-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2852 d1b366ba2b2720db8d9967dadcefd252.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2852 d1b366ba2b2720db8d9967dadcefd252.exe 2436 d1b366ba2b2720db8d9967dadcefd252.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2436 2852 d1b366ba2b2720db8d9967dadcefd252.exe 28 PID 2852 wrote to memory of 2436 2852 d1b366ba2b2720db8d9967dadcefd252.exe 28 PID 2852 wrote to memory of 2436 2852 d1b366ba2b2720db8d9967dadcefd252.exe 28 PID 2852 wrote to memory of 2436 2852 d1b366ba2b2720db8d9967dadcefd252.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1b366ba2b2720db8d9967dadcefd252.exe"C:\Users\Admin\AppData\Local\Temp\d1b366ba2b2720db8d9967dadcefd252.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\d1b366ba2b2720db8d9967dadcefd252.exeC:\Users\Admin\AppData\Local\Temp\d1b366ba2b2720db8d9967dadcefd252.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2436
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5f85ab8f7fe42d4a16399749a823681a6
SHA1d00ee678709dc5c7069e4d05eb5ee2a21c7f2567
SHA256c37ab94e67bb8057d971ff95c0d2a6463ed3cd06ee89041c38972b6e0a83fdc5
SHA512a802009e85b3a1faa923a60fe049c630b78852b0cfb8292a9f8329b02d6a3e7cabe9c40cdc7d377d62a1f385eaabc1648bdf30af80d70945e5a3ef079fd5ff7b