Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:56
Behavioral task
behavioral1
Sample
20296f558f2e1265e46148e742250e7f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20296f558f2e1265e46148e742250e7f.exe
Resource
win10v2004-20231215-en
General
-
Target
20296f558f2e1265e46148e742250e7f.exe
-
Size
1.3MB
-
MD5
20296f558f2e1265e46148e742250e7f
-
SHA1
99bc12048fc780d30aaea5812b34dff2bf6254a3
-
SHA256
e24f3f247e560cc3f7cf04df04b1d1fc508b6b9525a95c79d4970ef7755e53b7
-
SHA512
23db94053384ea4b3ca533922c4df02f1ec65bdf6d235b0ae4d557615bf57b0db245705e8a47d29a66147ac4185441766522f40cbc75d40c5b45507723796c37
-
SSDEEP
24576:OuVSdZlDLxez0nuz0xbSkoasK8+C8zu5t5CajYmoqACoXzvG:03uzTN18zy5C4YaAl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1888 20296f558f2e1265e46148e742250e7f.exe -
Executes dropped EXE 1 IoCs
pid Process 1888 20296f558f2e1265e46148e742250e7f.exe -
Loads dropped DLL 1 IoCs
pid Process 2532 20296f558f2e1265e46148e742250e7f.exe -
resource yara_rule behavioral1/memory/2532-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000c00000001224c-14.dat upx behavioral1/files/0x000c00000001224c-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2532 20296f558f2e1265e46148e742250e7f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2532 20296f558f2e1265e46148e742250e7f.exe 1888 20296f558f2e1265e46148e742250e7f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1888 2532 20296f558f2e1265e46148e742250e7f.exe 28 PID 2532 wrote to memory of 1888 2532 20296f558f2e1265e46148e742250e7f.exe 28 PID 2532 wrote to memory of 1888 2532 20296f558f2e1265e46148e742250e7f.exe 28 PID 2532 wrote to memory of 1888 2532 20296f558f2e1265e46148e742250e7f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\20296f558f2e1265e46148e742250e7f.exe"C:\Users\Admin\AppData\Local\Temp\20296f558f2e1265e46148e742250e7f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\20296f558f2e1265e46148e742250e7f.exeC:\Users\Admin\AppData\Local\Temp\20296f558f2e1265e46148e742250e7f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1888
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
894KB
MD5bfa295641f270170db19bfb13d7cf23a
SHA10eccded52f5b3eb5eee5facd3a37b980cea39590
SHA2563d815c9d00d776a9459ce0d30f13623acb7f2b94c5e86457653d9211ba956917
SHA512f756702347c64c9809f881f5292f6ec06f035a0cfcac148f79b1ccf2417a43e3a1d5a29dc4cf0e1002875b1cb33523b9c9e2454694d8dbab0f9ba07fa8eb4177
-
Filesize
898KB
MD53909381d7a1db61f977e7042245f8194
SHA1a084a08b67c2504080e223f0649b1d68c0cfc9ac
SHA256ef930ab97b6a7bbe856e2bec2192f91706e6453aa81a2c8ee61982736058736b
SHA5128a026ebc226953619454babdfa9abc585c22bc87eea0386f750dbf18c04342004927cbab9dc696733fedc5a777e63742167df48d3097f0884f47bc6ab0e00a83