Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
11b33f7d609534d8b66f5a0822e4de3e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11b33f7d609534d8b66f5a0822e4de3e.exe
Resource
win10v2004-20231215-en
General
-
Target
11b33f7d609534d8b66f5a0822e4de3e.exe
-
Size
347KB
-
MD5
11b33f7d609534d8b66f5a0822e4de3e
-
SHA1
54cc7edad01925b04322dac8098c6dda87cefa06
-
SHA256
210208179e5b58d849558ed55409a45dbc276935a4da1b5e53ec4745c7eb831c
-
SHA512
5bcc15d139987691f797fc51e59bb7749ac605247137a56ed351404b01b07c34a4b7b09554a62485bd1194c13376c7442138f64fd33f1fd2d72806dda3100067
-
SSDEEP
3072:94URpNUUX6z/DBXJfo/wGP2z5hS9u5rO+IpemPQ+Qir+2v:94SUjhto00HemPJrv
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0006000000016ead-15.dat acprotect behavioral1/memory/1616-254-0x0000000074800000-0x0000000074809000-memory.dmp acprotect behavioral1/memory/1616-12-0x0000000074830000-0x0000000074839000-memory.dmp acprotect -
Loads dropped DLL 16 IoCs
pid Process 1616 11b33f7d609534d8b66f5a0822e4de3e.exe 1616 11b33f7d609534d8b66f5a0822e4de3e.exe 1616 11b33f7d609534d8b66f5a0822e4de3e.exe 1616 11b33f7d609534d8b66f5a0822e4de3e.exe 1616 11b33f7d609534d8b66f5a0822e4de3e.exe 1616 11b33f7d609534d8b66f5a0822e4de3e.exe 1616 11b33f7d609534d8b66f5a0822e4de3e.exe 1616 11b33f7d609534d8b66f5a0822e4de3e.exe 1616 11b33f7d609534d8b66f5a0822e4de3e.exe 1616 11b33f7d609534d8b66f5a0822e4de3e.exe 1616 11b33f7d609534d8b66f5a0822e4de3e.exe 1616 11b33f7d609534d8b66f5a0822e4de3e.exe 1616 11b33f7d609534d8b66f5a0822e4de3e.exe 1616 11b33f7d609534d8b66f5a0822e4de3e.exe 1616 11b33f7d609534d8b66f5a0822e4de3e.exe 1616 11b33f7d609534d8b66f5a0822e4de3e.exe -
resource yara_rule behavioral1/files/0x0006000000016ead-15.dat upx behavioral1/memory/1616-254-0x0000000074800000-0x0000000074809000-memory.dmp upx behavioral1/memory/1616-12-0x0000000074830000-0x0000000074839000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1616 11b33f7d609534d8b66f5a0822e4de3e.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD590b689658ec8d6db4d705caf76c6efdd
SHA139c02cd73da9c5070a00064f5728325df3228dcf
SHA256b15f919ac3a34e28587e5f418a0ebe1767fe88440e9e83c510d82e3e5ee73257
SHA5127a7f574c2d6f07b7d63b4a91e2caa857e5bee34b5b6e9d08abd506f6ab6fa704a8dbc06de14b76f0bacf311d40c1ada599339f946d7daea1d04cc06554831a03
-
Filesize
14KB
MD534466cab38abcbc09ffac768d526f896
SHA12684f5f6c2b005cba812fc8cc1157777554fa3a3
SHA2568b4a1e7bf076c20240eb0a46cbdc8b835cfd89265fb78a3c1c5339ab820d2c1c
SHA5125c6ae996a81f0fd9d3efe4e61c8683eb833cb203a476772c06eadb48e10e34d05a8fc2c837cf663dcc3a37713bd86694c8eb251868aa5bb42c4b21ba8c8e8fc7
-
Filesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de