Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
0429a6aa782622e2313ebdb53de755a8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0429a6aa782622e2313ebdb53de755a8.exe
Resource
win10v2004-20231215-en
General
-
Target
0429a6aa782622e2313ebdb53de755a8.exe
-
Size
82KB
-
MD5
0429a6aa782622e2313ebdb53de755a8
-
SHA1
4827e77270412b71ba7b4093278a806a2dbcce36
-
SHA256
21bf19f8fa75a8e180c336fda6f320309aa39547763b403346a94c51e5865953
-
SHA512
eb5add72f60d92029e8cdcf05d646175befa006446a41fea92a6401a9b27cb89acd7f5b736e4b96b8de51cdf6731d383e80441e167c27f02a84ead949a155284
-
SSDEEP
1536:OqLvKnkMqEcUoOhYTPYs88IdZMk3e03CUT3/ubhaIp3ZzD2/mYK1z7d5Hgy/t8Jo:OQS9nQzMZYU6b53ZzD2/mYK1z76e
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2988 0429a6aa782622e2313ebdb53de755a8.exe -
Executes dropped EXE 1 IoCs
pid Process 2988 0429a6aa782622e2313ebdb53de755a8.exe -
Loads dropped DLL 1 IoCs
pid Process 2208 0429a6aa782622e2313ebdb53de755a8.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2208 0429a6aa782622e2313ebdb53de755a8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2208 0429a6aa782622e2313ebdb53de755a8.exe 2988 0429a6aa782622e2313ebdb53de755a8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2988 2208 0429a6aa782622e2313ebdb53de755a8.exe 29 PID 2208 wrote to memory of 2988 2208 0429a6aa782622e2313ebdb53de755a8.exe 29 PID 2208 wrote to memory of 2988 2208 0429a6aa782622e2313ebdb53de755a8.exe 29 PID 2208 wrote to memory of 2988 2208 0429a6aa782622e2313ebdb53de755a8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0429a6aa782622e2313ebdb53de755a8.exe"C:\Users\Admin\AppData\Local\Temp\0429a6aa782622e2313ebdb53de755a8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\0429a6aa782622e2313ebdb53de755a8.exeC:\Users\Admin\AppData\Local\Temp\0429a6aa782622e2313ebdb53de755a8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2988
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD570dfbe618ccc0767163ff838a854f5ab
SHA15b48e32f6b55f2c78300c92e4a1693e1f45e510d
SHA2569157a9959564375fbf421618f8354dddf165686f691d700199ffe839e71a1825
SHA512ca798962e2f0334ac276f863ac01fed7c707d6a269281c566544339e15921e467b115f7c36e79047204ec07e6101a8f82de265c59a19b3587b0c2bfbf90ee906