Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 19:48
Behavioral task
behavioral1
Sample
3926bbf94560b84c49335f7a7bcddf9e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3926bbf94560b84c49335f7a7bcddf9e.exe
Resource
win10v2004-20231215-en
General
-
Target
3926bbf94560b84c49335f7a7bcddf9e.exe
-
Size
14.9MB
-
MD5
3926bbf94560b84c49335f7a7bcddf9e
-
SHA1
c1b1a50bc2ca474461a23960d58bde097c463a5f
-
SHA256
bb8da044da7e04f0c40bb62daf2c2ea58e1c287ab6089810b2d5614991541a1d
-
SHA512
e0c522dd818431dd15de8d0ae168756820c13b0b59642fbe0d47e4c3506eb702c9d31b91286a12e428b82e68767e79e0431f20beb3e6488945e760a2eb0b5463
-
SSDEEP
393216:+YB93E8VxOa43LIzCvXGnY019JxYCv1fAlTOpD8:+w93E8Py312Rf9f
Malware Config
Signatures
-
Loads dropped DLL 45 IoCs
pid Process 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: 35 2672 3926bbf94560b84c49335f7a7bcddf9e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2672 3926bbf94560b84c49335f7a7bcddf9e.exe 2672 3926bbf94560b84c49335f7a7bcddf9e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2672 2244 3926bbf94560b84c49335f7a7bcddf9e.exe 23 PID 2244 wrote to memory of 2672 2244 3926bbf94560b84c49335f7a7bcddf9e.exe 23 PID 2244 wrote to memory of 2672 2244 3926bbf94560b84c49335f7a7bcddf9e.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\3926bbf94560b84c49335f7a7bcddf9e.exe"C:\Users\Admin\AppData\Local\Temp\3926bbf94560b84c49335f7a7bcddf9e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\3926bbf94560b84c49335f7a7bcddf9e.exe"C:\Users\Admin\AppData\Local\Temp\3926bbf94560b84c49335f7a7bcddf9e.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5f62b66f451f2daa8410ad62d453fa0a2
SHA14bf13db65943e708690d6256d7ddd421cc1cc72b
SHA25648eb5b52227b6fb5be70cb34009c8da68356b62f3e707db56af957338ba82720
SHA512d64c2a72adf40bd451341552e7e6958779de3054b0cf676b876c3ba7b86147aecba051ac08adc0c3bfb2779109f87dca706c43de3ce36e05af0ddee02bbbf419
-
Filesize
18KB
MD549c3ffd47257dbcb67a6be9ee112ba7f
SHA104669214375b25e2dc8a3635484e6eeb206bc4eb
SHA256322d963d2a2aefd784e99697c59d494853d69bed8efd4b445f59292930a6b165
SHA512bda5e6c669b04aaed89538a982ef430cef389237c6c1d670819a22b2a20bf3c22aef5cb4e73ef7837cbbd89d870693899f97cb538122059c885f4b19b7860a98
-
Filesize
20KB
MD5588bd2a8e0152e0918742c1a69038f1d
SHA19874398548891f6a08fc06437996f84eb7495783
SHA256a07cc878ab5595aacd4ab229a6794513f897bd7ad14bcec353793379146b2094
SHA51232ffe64c697f94c4db641ab3e20b0f522cf3eba9863164f1f6271d2f32529250292a16be95f32d852480bd1b59b8b0554c1e7fd7c7a336f56c048f4f56e4d62f
-
Filesize
18KB
MD5d699333637db92d319661286df7cc39e
SHA10bffb9ed366853e7019452644d26e8e8f236241b
SHA256fe760614903e6d46a1be508dccb65cf6929d792a1db2c365fc937f2a8a240504
SHA5126fa9ff0e45f803faf3eb9908e810a492f6f971cb96d58c06f408980ab40cba138b52d853aa0e3c68474053690dfafa1817f4b4c8fb728d613696b6c516fa0f51
-
Filesize
992KB
MD50e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA14189f4459c54e69c6d3155a82524bda7549a75a6
SHA2568a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd