Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
2c931458339dbe604995958b99053308.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2c931458339dbe604995958b99053308.exe
Resource
win10v2004-20231215-en
General
-
Target
2c931458339dbe604995958b99053308.exe
-
Size
4.9MB
-
MD5
2c931458339dbe604995958b99053308
-
SHA1
e995058bcdc037a71f32db3256ab4abf82640a22
-
SHA256
d14959bcb9bc49ab22a85b674038a563e1cf160b13dca14996853a16bfc8c111
-
SHA512
af7d477d333032fffee4364ef1c15f23306466f81ebefb736a358caeaa1e72e121789b4766f7a074114be474dfa008ad05c5404052c28763f8c765a98971d43c
-
SSDEEP
98304:Ev0v17FWeu7WM2R0bJAHJ8dP3EXi/rHDWQMRt7qN0CGBPXUaE/bEyP:A0d7FWeuyMLJ3ESjjd2yCq/AyP
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2856 2c931458339dbe604995958b99053308.tmp -
Loads dropped DLL 2 IoCs
pid Process 1984 2c931458339dbe604995958b99053308.exe 2856 2c931458339dbe604995958b99053308.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2856 1984 2c931458339dbe604995958b99053308.exe 28 PID 1984 wrote to memory of 2856 1984 2c931458339dbe604995958b99053308.exe 28 PID 1984 wrote to memory of 2856 1984 2c931458339dbe604995958b99053308.exe 28 PID 1984 wrote to memory of 2856 1984 2c931458339dbe604995958b99053308.exe 28 PID 1984 wrote to memory of 2856 1984 2c931458339dbe604995958b99053308.exe 28 PID 1984 wrote to memory of 2856 1984 2c931458339dbe604995958b99053308.exe 28 PID 1984 wrote to memory of 2856 1984 2c931458339dbe604995958b99053308.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c931458339dbe604995958b99053308.exe"C:\Users\Admin\AppData\Local\Temp\2c931458339dbe604995958b99053308.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\is-E4E83.tmp\2c931458339dbe604995958b99053308.tmp"C:\Users\Admin\AppData\Local\Temp\is-E4E83.tmp\2c931458339dbe604995958b99053308.tmp" /SL5="$4010C,4568266,119808,C:\Users\Admin\AppData\Local\Temp\2c931458339dbe604995958b99053308.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2856
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287KB
MD519b3a20e3a5d83d05ea38b587fa3b861
SHA152782d77292ef1bd7f7dfb2abb778bd179a2c7bf
SHA25646aece175b0b3fb4840d7f312c2feba0e04f5b139b539264f9e9b2bdf9155273
SHA512040823c8d0d86c729517e27d561fdfb198bbee5f92b2b3993629dec942773a4a85d252fa7f7c8c937bda024a48ed9bbfb0637a6b70df990f8480dfcb02d3254c
-
Filesize
200KB
MD5d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
Filesize
231KB
MD5a55a8ca1bd8342ebfb1e4e3a784b3f87
SHA197957583dc6b43ca0b27063dd895c283e9529adb
SHA256a65ac1fc8d202746873889cd13ed763987158e1626ad69a0102469c940230580
SHA5122be7209162c8244d3bb14f0636e368db91186bccb10c1f85136f529c716d3c7c59450a72e06a4d069d1e5eb08d88fb54efa9f27f77b1a7b674f1433e56552484