Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 01:09
Behavioral task
behavioral1
Sample
48188d02df997cc3856af968280206e2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48188d02df997cc3856af968280206e2.exe
Resource
win10v2004-20231215-en
General
-
Target
48188d02df997cc3856af968280206e2.exe
-
Size
353KB
-
MD5
48188d02df997cc3856af968280206e2
-
SHA1
4571de51678ed4403d378bb48a05ba5e05fe99e8
-
SHA256
3947da3f6396cc14fd47521312ad46d5afd93b711c05f1f2952e3f691a3e795b
-
SHA512
0f4de1848d20cbb655e92721e5647f9fe9e68ef2a69fa40d1828f9fcd7b9d1b867dff3ee1085e2d2c39593b2c9d9857f99c6113053c10b00d7bda08a790fa648
-
SSDEEP
6144:Y8TVl/60L6dxJfnITw7zKivUhIYE+1Xjq9YdxfsLPrPwo+:Y8/y0L6dxVa/hIYEoTq9YTfmE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2764 48188d02df997cc3856af968280206e2.exe -
Executes dropped EXE 1 IoCs
pid Process 2764 48188d02df997cc3856af968280206e2.exe -
Loads dropped DLL 1 IoCs
pid Process 2384 48188d02df997cc3856af968280206e2.exe -
resource yara_rule behavioral1/memory/2384-0-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/files/0x000a00000001225a-10.dat upx behavioral1/files/0x000a00000001225a-16.dat upx behavioral1/memory/2764-17-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/memory/2384-15-0x0000000002E80000-0x0000000002F71000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2384 48188d02df997cc3856af968280206e2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2384 48188d02df997cc3856af968280206e2.exe 2764 48188d02df997cc3856af968280206e2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2764 2384 48188d02df997cc3856af968280206e2.exe 29 PID 2384 wrote to memory of 2764 2384 48188d02df997cc3856af968280206e2.exe 29 PID 2384 wrote to memory of 2764 2384 48188d02df997cc3856af968280206e2.exe 29 PID 2384 wrote to memory of 2764 2384 48188d02df997cc3856af968280206e2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\48188d02df997cc3856af968280206e2.exe"C:\Users\Admin\AppData\Local\Temp\48188d02df997cc3856af968280206e2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\48188d02df997cc3856af968280206e2.exeC:\Users\Admin\AppData\Local\Temp\48188d02df997cc3856af968280206e2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2764
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ee25936ae3e97b6e05b6e205a01a4b13
SHA1efae8bf094bd48a195e364032f10f336ac739385
SHA2569a3714dea738c6c7254d3f15700183d371e790baeef7c1256b3a19c6128d9cb7
SHA51220f4360f5c600ed74ffebc67af43489fff2712e04bb267351f6338ee466c1199048ef0cc20d976844414a7e01a318ea067510c8da8a3ac895d0f251e764ae9a2