Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
10d0201de1a8bd609600f89c1f4e5dc5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10d0201de1a8bd609600f89c1f4e5dc5.exe
Resource
win10v2004-20231222-en
General
-
Target
10d0201de1a8bd609600f89c1f4e5dc5.exe
-
Size
4.7MB
-
MD5
10d0201de1a8bd609600f89c1f4e5dc5
-
SHA1
0a3b35295bb8880ce0e6d18c649b8d29219eedf9
-
SHA256
69c2b26b30c6ba2d05b2e6c1f3d9c9655d5538cf8e7358d068abf6c6229fc8da
-
SHA512
7c1a76545704557edc604b6d3e02bdafbb401e4de1796df15e41f78a7ce1c9ec14164f855a8d515be6d3bf43a7eec0d2e78a8aa7cd98d02173f39d5ba006bf8a
-
SSDEEP
98304:e2a6lJo8LvZQkOIV5ZCJiJrsZ6biwvQ/RYgcf/pjVWTYZECWUcEnU:RlLjZgIVc6bqRgCSfWEU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1748 10d0201de1a8bd609600f89c1f4e5dc5.tmp -
Loads dropped DLL 4 IoCs
pid Process 2848 10d0201de1a8bd609600f89c1f4e5dc5.exe 1748 10d0201de1a8bd609600f89c1f4e5dc5.tmp 1748 10d0201de1a8bd609600f89c1f4e5dc5.tmp 1748 10d0201de1a8bd609600f89c1f4e5dc5.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1748 10d0201de1a8bd609600f89c1f4e5dc5.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2848 wrote to memory of 1748 2848 10d0201de1a8bd609600f89c1f4e5dc5.exe 28 PID 2848 wrote to memory of 1748 2848 10d0201de1a8bd609600f89c1f4e5dc5.exe 28 PID 2848 wrote to memory of 1748 2848 10d0201de1a8bd609600f89c1f4e5dc5.exe 28 PID 2848 wrote to memory of 1748 2848 10d0201de1a8bd609600f89c1f4e5dc5.exe 28 PID 2848 wrote to memory of 1748 2848 10d0201de1a8bd609600f89c1f4e5dc5.exe 28 PID 2848 wrote to memory of 1748 2848 10d0201de1a8bd609600f89c1f4e5dc5.exe 28 PID 2848 wrote to memory of 1748 2848 10d0201de1a8bd609600f89c1f4e5dc5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\10d0201de1a8bd609600f89c1f4e5dc5.exe"C:\Users\Admin\AppData\Local\Temp\10d0201de1a8bd609600f89c1f4e5dc5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\is-JFG4B.tmp\10d0201de1a8bd609600f89c1f4e5dc5.tmp"C:\Users\Admin\AppData\Local\Temp\is-JFG4B.tmp\10d0201de1a8bd609600f89c1f4e5dc5.tmp" /SL5="$500F8,4423017,85504,C:\Users\Admin\AppData\Local\Temp\10d0201de1a8bd609600f89c1f4e5dc5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1748
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
200KB
MD5d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
Filesize
1.1MB
MD576395a5fe6fb2d8d09987924a603212c
SHA1b5952c2d3b80fa265b1312e47fc72e1427edb357
SHA25644474fc13166b54bc018b4cdb0c649552189b7a2d4584f4b68ab226af436a241
SHA51205b93d7735bd124407812e414906a345bacbc0b5327215eadbf45288835487de9e34292141e28970a6f27ea941ba947bba696b7e3b68af32d0c5068cf7269d7f