Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
47988d6b141bfcdf74da78c599f80977.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47988d6b141bfcdf74da78c599f80977.exe
Resource
win10v2004-20231215-en
General
-
Target
47988d6b141bfcdf74da78c599f80977.exe
-
Size
169KB
-
MD5
47988d6b141bfcdf74da78c599f80977
-
SHA1
d4e5ca28440ea73f5c03cf520fdf5c0efaecf49f
-
SHA256
1ebb874504be7c683e7064dadec0138d8835cbd6f2700a739afb8850b28cbaf3
-
SHA512
4a8c3b120ddaa69b803090805b0736c5f09dfe1a4f4aabbfa4f61b2317c4b2fdd359ce07ea0afd21a599c881203c4823118918bacdf962f829b71005e9f3e642
-
SSDEEP
3072:z5xJ5sydtOQQ5g7xfEF6cje/CbCvHz5LS74iE/cqopW9sz3GXZo0scMqF2DeP3mW:zJ5s8ti5gdEUcCamvl+4MY23GJo0scx5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2248 47988d6b141bfcdf74da78c599f80977.exe -
Executes dropped EXE 1 IoCs
pid Process 2248 47988d6b141bfcdf74da78c599f80977.exe -
Loads dropped DLL 1 IoCs
pid Process 1752 47988d6b141bfcdf74da78c599f80977.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1752 47988d6b141bfcdf74da78c599f80977.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1752 47988d6b141bfcdf74da78c599f80977.exe 2248 47988d6b141bfcdf74da78c599f80977.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2248 1752 47988d6b141bfcdf74da78c599f80977.exe 29 PID 1752 wrote to memory of 2248 1752 47988d6b141bfcdf74da78c599f80977.exe 29 PID 1752 wrote to memory of 2248 1752 47988d6b141bfcdf74da78c599f80977.exe 29 PID 1752 wrote to memory of 2248 1752 47988d6b141bfcdf74da78c599f80977.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\47988d6b141bfcdf74da78c599f80977.exe"C:\Users\Admin\AppData\Local\Temp\47988d6b141bfcdf74da78c599f80977.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\47988d6b141bfcdf74da78c599f80977.exeC:\Users\Admin\AppData\Local\Temp\47988d6b141bfcdf74da78c599f80977.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2248
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD53e7dc2036f4b8c6e5ce917412f9a3299
SHA18c1cd044fa228ac542acc19c050b2d70589e809e
SHA256f351fee46672143e0224c6e8c5692257527bd8bdda13b63a378ffea00112efd6
SHA5127d3bb30a93be41edf8a94c440a388b47730bbc877846c43b5ad4e62c4ad1523b190a986d7b33ba2a5de8f91b12b6303e95f42eb12c4d50e1506f6958f4231e74