Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 16:36
Behavioral task
behavioral1
Sample
f444795e1fe2c0819a23c73ad2e30eec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f444795e1fe2c0819a23c73ad2e30eec.exe
Resource
win10v2004-20231215-en
General
-
Target
f444795e1fe2c0819a23c73ad2e30eec.exe
-
Size
2.7MB
-
MD5
f444795e1fe2c0819a23c73ad2e30eec
-
SHA1
e4492a2c70c8dc1dd027e1a3a5c57782919e3a38
-
SHA256
f2a517d3798f37f69f4848c8cdaa745e4c38830ab95a0e3315ba7ee1036e1301
-
SHA512
3fba2e51c577b2bc70d53666e57e06b41f065f02b6e8b4d1c0a969e273df372d4bd82f491ce04f03212547c31bc9cfba965444b0615cbf826a1f20bef9fbb03d
-
SSDEEP
49152:rvsbLvtJk8aBEobHUiZgxrR9SfFyG/Jq73X1jm+IyZBT/kjHMR9j:rkknfbHUiC9HSPMH1iEZ1/MsHj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2796 f444795e1fe2c0819a23c73ad2e30eec.exe -
Executes dropped EXE 1 IoCs
pid Process 2796 f444795e1fe2c0819a23c73ad2e30eec.exe -
Loads dropped DLL 1 IoCs
pid Process 2776 f444795e1fe2c0819a23c73ad2e30eec.exe -
resource yara_rule behavioral1/memory/2776-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x0007000000012284-10.dat upx behavioral1/files/0x0007000000012284-15.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2776 f444795e1fe2c0819a23c73ad2e30eec.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2776 f444795e1fe2c0819a23c73ad2e30eec.exe 2796 f444795e1fe2c0819a23c73ad2e30eec.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2796 2776 f444795e1fe2c0819a23c73ad2e30eec.exe 27 PID 2776 wrote to memory of 2796 2776 f444795e1fe2c0819a23c73ad2e30eec.exe 27 PID 2776 wrote to memory of 2796 2776 f444795e1fe2c0819a23c73ad2e30eec.exe 27 PID 2776 wrote to memory of 2796 2776 f444795e1fe2c0819a23c73ad2e30eec.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f444795e1fe2c0819a23c73ad2e30eec.exe"C:\Users\Admin\AppData\Local\Temp\f444795e1fe2c0819a23c73ad2e30eec.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\f444795e1fe2c0819a23c73ad2e30eec.exeC:\Users\Admin\AppData\Local\Temp\f444795e1fe2c0819a23c73ad2e30eec.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2796
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD57178354b18d0347cb351da710505e378
SHA17e04fb5ea2f70962a80b08554fa9d0ef2f242bc9
SHA25680b18614e3f83bfba9363d5f69e2d62a36ec33ea02c70275c25f57fb0b9be1b5
SHA512ee35a26b535469696066243e87ddcef955fb8c0a50894210ad1fdf4fe7acab84e4ec898733aa8e4f2f07ffc3f064dfa30c6e8d33dd77f96069916c4da28e689d
-
Filesize
273KB
MD50664879772530ea01ae578893d6cfbec
SHA13103f2a624b1d7a9b199012daab6cd3c7337285d
SHA2565d06b4e9fd785336967d730b943a43d06d4ef69e1ae42645c6fda22a4c40849d
SHA5122ed95a773fc205db3640df80fa4fd8af180033d1206405d5d79f56cea5c1388704b27bcd2607355941667e86b7114c96f684b50e602a0fbcc2fb541ae12e2f4d