Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
3db077694e62e354d060fa2aace5cf49.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3db077694e62e354d060fa2aace5cf49.exe
Resource
win10v2004-20231215-en
General
-
Target
3db077694e62e354d060fa2aace5cf49.exe
-
Size
84KB
-
MD5
3db077694e62e354d060fa2aace5cf49
-
SHA1
ad3b22af5a47ff566b337ab7989dbd2b50334804
-
SHA256
282d1f96d583c1b04327d61425645e3a5a9352ebbce006a768079b93785d5be4
-
SHA512
2f5382080054c4947f31c13378d6346c47e35b6a522963141f3d5cf102d70b96dae4fc65cf844afd12bd6cbdfe86713a24e0867397c1d719c211eda88cf040b2
-
SSDEEP
1536:cLo0Q1Q96lZwEJk4twvlQDh3dgKGzK8nqu7OijCvBZmvmdF+GWBeN+P:cLo0Q1U6FniQDhtBpW16YIosF+JT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2748 3db077694e62e354d060fa2aace5cf49.exe -
Executes dropped EXE 1 IoCs
pid Process 2748 3db077694e62e354d060fa2aace5cf49.exe -
Loads dropped DLL 1 IoCs
pid Process 2028 3db077694e62e354d060fa2aace5cf49.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2028 3db077694e62e354d060fa2aace5cf49.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2028 3db077694e62e354d060fa2aace5cf49.exe 2748 3db077694e62e354d060fa2aace5cf49.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2748 2028 3db077694e62e354d060fa2aace5cf49.exe 29 PID 2028 wrote to memory of 2748 2028 3db077694e62e354d060fa2aace5cf49.exe 29 PID 2028 wrote to memory of 2748 2028 3db077694e62e354d060fa2aace5cf49.exe 29 PID 2028 wrote to memory of 2748 2028 3db077694e62e354d060fa2aace5cf49.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3db077694e62e354d060fa2aace5cf49.exe"C:\Users\Admin\AppData\Local\Temp\3db077694e62e354d060fa2aace5cf49.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\3db077694e62e354d060fa2aace5cf49.exeC:\Users\Admin\AppData\Local\Temp\3db077694e62e354d060fa2aace5cf49.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2748
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5f79c51c0a99636273af7a16e1a65e54d
SHA1ed703a91f02d28afd20b8e5102aef9c8cdc5ff29
SHA2567a2fd328649ba7e69157598a710f5307709596ac7a6edfe09da7c7998bae5cf8
SHA512fa29b95afbde84f7708de4ace9d90c1285966a24fc3274befc68cea8f2ee6258cf8bfaf0ccdfd87987e236b53f21bcbfe49bea65e8015949a20f94c63d004c8f