Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
2a811c710db999f26397e6994cce482b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a811c710db999f26397e6994cce482b.exe
Resource
win10v2004-20231215-en
General
-
Target
2a811c710db999f26397e6994cce482b.exe
-
Size
639KB
-
MD5
2a811c710db999f26397e6994cce482b
-
SHA1
5edc90c737bddf7555a0790270ab0a0308fc8d44
-
SHA256
122261fefa44b05aeb90d48cf719a00002d78eb268fa977f4078ed78c7ec6c93
-
SHA512
c006dd4b76469101ac0f7e2536be9c88cf6490c51884ea33c7e2428dee1ed774017d2515276976e748697394f30f33ae97634ada4ae573f84a296ff4e457c601
-
SSDEEP
12288:7w4ub21OBjYGRaJQagcBIzZn3OEXlI/4okHd3hLH9tf0RVap:ULb2lGRFdp3+kHdldtmVap
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1520 2a811c710db999f26397e6994cce482b.exe 1520 2a811c710db999f26397e6994cce482b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2644 1520 2a811c710db999f26397e6994cce482b.exe 19 PID 1520 wrote to memory of 2644 1520 2a811c710db999f26397e6994cce482b.exe 19 PID 1520 wrote to memory of 2644 1520 2a811c710db999f26397e6994cce482b.exe 19 PID 1520 wrote to memory of 2644 1520 2a811c710db999f26397e6994cce482b.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a811c710db999f26397e6994cce482b.exe"C:\Users\Admin\AppData\Local\Temp\2a811c710db999f26397e6994cce482b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\n2076\s2076.exe"C:\Users\Admin\AppData\Local\Temp\n2076\s2076.exe" 4131196c4f0295b7e4e872dcxRaj4NhSdeiRf4tuxd4Zzr4kw9NZfmqc6T5KMnSh4R2eR7TcmiD7lDV9v+MT/MlcVMvsa9+xiJvvu5aHXBT6BgZeOA+UWWfdvPwLJtFcWvwKKhPj5cFF3zkT4OJyZVIwBhGhO2n3itWgKP5E+Nzr90YmvbgUaJZuKI3ayA== /v "C:\Users\Admin\AppData\Local\Temp\2a811c710db999f26397e6994cce482b.exe" /a2⤵PID:2644
-