Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
1731951de2fc83f47a9e066df2f40d38.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1731951de2fc83f47a9e066df2f40d38.exe
Resource
win10v2004-20231215-en
General
-
Target
1731951de2fc83f47a9e066df2f40d38.exe
-
Size
1.5MB
-
MD5
1731951de2fc83f47a9e066df2f40d38
-
SHA1
529a755044dee0a498fbee0922d56eb4ee96be70
-
SHA256
b88d7d8c53bb43c130017bcaaa9934a43cdf6b98cc4b49ded6b3968560ae52c2
-
SHA512
acf7a6345c82338cf649ea8c207680579d938c16093efd3aa6a3ef45a1ed6a5c9168eab2fdf34dbc901bc1c13b6196d789a2522ee067850aac4e7645f9a671fd
-
SSDEEP
49152:lrq0R07QQm0XvdZzmULaRHA/deViynVOlJIt:hq0+7DXFNmDRpViyVOwt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3000 10D2.tmp -
Executes dropped EXE 1 IoCs
pid Process 3000 10D2.tmp -
Loads dropped DLL 1 IoCs
pid Process 1764 1731951de2fc83f47a9e066df2f40d38.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1764 wrote to memory of 3000 1764 1731951de2fc83f47a9e066df2f40d38.exe 28 PID 1764 wrote to memory of 3000 1764 1731951de2fc83f47a9e066df2f40d38.exe 28 PID 1764 wrote to memory of 3000 1764 1731951de2fc83f47a9e066df2f40d38.exe 28 PID 1764 wrote to memory of 3000 1764 1731951de2fc83f47a9e066df2f40d38.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1731951de2fc83f47a9e066df2f40d38.exe"C:\Users\Admin\AppData\Local\Temp\1731951de2fc83f47a9e066df2f40d38.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\10D2.tmp"C:\Users\Admin\AppData\Local\Temp\10D2.tmp" --pingC:\Users\Admin\AppData\Local\Temp\1731951de2fc83f47a9e066df2f40d38.exe 7CD11AC6962CD564552DCAED6F5F014DE31C074A4DD9F0579D949FE309F51B1DD83662545C7BA34B2A0E2AD18AACCD05520672B39251F58F3284ABCFC5532ABD2⤵
- Deletes itself
- Executes dropped EXE
PID:3000
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD566bb3bc1f3429b3022aa818ebd7701c4
SHA1bb844882114e83741feac137fe5e3ceb6c0b8372
SHA2560b0de45ebf534b318110ab704d8eff7580b44628416df5b3b6f674c09aced106
SHA512d15774e7a35905116ee7523e6501eaee0fb371fef6355ddaa36de9a91ba2124aef1deb927c9b23e7f6199a0e5ac1a2900e25f3485f526833a4ea2389287c6431
-
Filesize
1024KB
MD5fba9332efd195647601afb07bdc9bd50
SHA17353b92b3fe817482fc531d8ba5ca16066fb1bed
SHA256dbadaf2bbf32da9a1c9725bbab9447362b8d258315feaaebf3c5478ca3700a54
SHA51208c40beeb6486314fc2a813404c58f470da631a11309d27ce3b359ad26a749a8fca046cea25960e09fc5cb86a7a8e9929892ac7d2200c548122b227acb127b02