Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 16:27
Behavioral task
behavioral1
Sample
efc5375e36af2d2754df1086dfdbec4b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
efc5375e36af2d2754df1086dfdbec4b.exe
Resource
win10v2004-20231215-en
General
-
Target
efc5375e36af2d2754df1086dfdbec4b.exe
-
Size
5.8MB
-
MD5
efc5375e36af2d2754df1086dfdbec4b
-
SHA1
906787504dd0e1affa6eff58f843c7af0685153f
-
SHA256
0f4a6b1ca20b1846e96d1017796cc4ee26e330eb125648a0e4aeb8dbb5211306
-
SHA512
9b1c4b484f2008dbce6bb9996fd6701445bca7b620b98d6ad4dafaf661d12f7647d7a4f2f53ee8ca60bbc6cbd8474a0f422813f58fdccd53484ed0d0dca6500f
-
SSDEEP
98304:QKpodZeIjD4E1dcGQZaXhP5a9UEI+eG9jAkbkR79D+cVItGQZaXhP5a9UEI+eG:QMQZPjbSGhRaaCkN9qHGhRa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2432 efc5375e36af2d2754df1086dfdbec4b.exe -
Executes dropped EXE 1 IoCs
pid Process 2432 efc5375e36af2d2754df1086dfdbec4b.exe -
Loads dropped DLL 1 IoCs
pid Process 1436 efc5375e36af2d2754df1086dfdbec4b.exe -
resource yara_rule behavioral1/memory/1436-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000800000001222d-10.dat upx behavioral1/files/0x000800000001222d-13.dat upx behavioral1/memory/2432-17-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1436 efc5375e36af2d2754df1086dfdbec4b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1436 efc5375e36af2d2754df1086dfdbec4b.exe 2432 efc5375e36af2d2754df1086dfdbec4b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1436 wrote to memory of 2432 1436 efc5375e36af2d2754df1086dfdbec4b.exe 28 PID 1436 wrote to memory of 2432 1436 efc5375e36af2d2754df1086dfdbec4b.exe 28 PID 1436 wrote to memory of 2432 1436 efc5375e36af2d2754df1086dfdbec4b.exe 28 PID 1436 wrote to memory of 2432 1436 efc5375e36af2d2754df1086dfdbec4b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\efc5375e36af2d2754df1086dfdbec4b.exe"C:\Users\Admin\AppData\Local\Temp\efc5375e36af2d2754df1086dfdbec4b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\efc5375e36af2d2754df1086dfdbec4b.exeC:\Users\Admin\AppData\Local\Temp\efc5375e36af2d2754df1086dfdbec4b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2432
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5f1dc80bdf9d4a11ac631dc3c12ae1200
SHA1a137a55e08d74559884f71f0a1ff7ea1fbf9e17c
SHA256df42d9cf98fbee0e3357c61537b078b95b532dc47029add819a862f31adb8614
SHA5125db2ee8a0258d6dbe1f8506c740fe079aadf77c19a6f75862e798d82967a2a534703f9dd046f554ac59cfadd61267a7148bbdb11185a7965b88408ab4b6adb3d
-
Filesize
1.7MB
MD56a3a899ec8d2ea74e1a927b69de0ea11
SHA12fd1e02432a4a3bb1310a09039820a6d9c7df84f
SHA2567f92e6d87ec0f0d26fbedc29960064a04b937fe2fa6aa0edfaf27f4be01bb70d
SHA512b7af9f1508e9dfa76ba7a1cbcaf04df12e306bda42dd4fa0c942a78bae6faeafb42e9142620396256d1611949e384174a4da7744250feb3b5ddc54cee742ed48