Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 23:42
Behavioral task
behavioral1
Sample
1a70ddda3494f38620d8225722dcaa0b.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1a70ddda3494f38620d8225722dcaa0b.exe
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
1a70ddda3494f38620d8225722dcaa0b.exe
-
Size
124KB
-
MD5
1a70ddda3494f38620d8225722dcaa0b
-
SHA1
4ba005c61bfbbf44bb3a6d4e074db32ce1067cbb
-
SHA256
c25a422adb9d3a908fce0bea29bb9b1e3d79caf699a9d4b73ed3c64ce73b9c1c
-
SHA512
89871bfb42e4fa890ebee8c42d17a1b1c3a71be8c5e38eec29f05bc34071372024e9ab72ab9e2fdf3495f51165da427d6f0c2f9d564b569405a381a34fab848d
-
SSDEEP
3072:vifRL+q31nJ/XOXVh06/0NEUYynNELl1RAX61qrZLnznF:6fBZ1nJSZ/MY2ilfAq1IZt
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2700 1a70ddda3494f38620d8225722dcaa0b.exe -
Loads dropped DLL 2 IoCs
pid Process 2040 1a70ddda3494f38620d8225722dcaa0b.exe 2040 1a70ddda3494f38620d8225722dcaa0b.exe -
resource yara_rule behavioral1/memory/2040-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2700-16-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2700-18-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2040-14-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2700 2040 1a70ddda3494f38620d8225722dcaa0b.exe 14 PID 2040 wrote to memory of 2700 2040 1a70ddda3494f38620d8225722dcaa0b.exe 14 PID 2040 wrote to memory of 2700 2040 1a70ddda3494f38620d8225722dcaa0b.exe 14 PID 2040 wrote to memory of 2700 2040 1a70ddda3494f38620d8225722dcaa0b.exe 14
Processes
-
C:\Windows\Temp\MT\1a70ddda3494f38620d8225722dcaa0b.exe"C:\Windows\Temp\MT\1a70ddda3494f38620d8225722dcaa0b.exe"1⤵
- Executes dropped EXE
PID:2700
-
C:\Users\Admin\AppData\Local\Temp\1a70ddda3494f38620d8225722dcaa0b.exe"C:\Users\Admin\AppData\Local\Temp\1a70ddda3494f38620d8225722dcaa0b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2040