Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
5d6ce35a1c2db1d5777b4190f13d6889.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5d6ce35a1c2db1d5777b4190f13d6889.exe
Resource
win10v2004-20231215-en
General
-
Target
5d6ce35a1c2db1d5777b4190f13d6889.exe
-
Size
82KB
-
MD5
5d6ce35a1c2db1d5777b4190f13d6889
-
SHA1
7cb214de1e600ff1948976702d8f46961e1c3635
-
SHA256
dc59d7dbf3156d1dde3be50d50bf5538b2d36337fb78790f6adf4e63fc35eede
-
SHA512
0420a59225082f3dadd5cf2abd5ed149ff7b5340a483aa10c14859098bb6f06bdbc45947d965f58fecbc072153cd3f79a68d1743e6d13d9ec0da25e417c8f83c
-
SSDEEP
1536:xzRf1WODfKweiw7fHPOo0kS4nabYHakr73OLJoMl:MODihjPN0DulHvn3uuS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2832 5d6ce35a1c2db1d5777b4190f13d6889.exe -
Executes dropped EXE 1 IoCs
pid Process 2832 5d6ce35a1c2db1d5777b4190f13d6889.exe -
Loads dropped DLL 1 IoCs
pid Process 2124 5d6ce35a1c2db1d5777b4190f13d6889.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2124 5d6ce35a1c2db1d5777b4190f13d6889.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2124 5d6ce35a1c2db1d5777b4190f13d6889.exe 2832 5d6ce35a1c2db1d5777b4190f13d6889.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2832 2124 5d6ce35a1c2db1d5777b4190f13d6889.exe 29 PID 2124 wrote to memory of 2832 2124 5d6ce35a1c2db1d5777b4190f13d6889.exe 29 PID 2124 wrote to memory of 2832 2124 5d6ce35a1c2db1d5777b4190f13d6889.exe 29 PID 2124 wrote to memory of 2832 2124 5d6ce35a1c2db1d5777b4190f13d6889.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d6ce35a1c2db1d5777b4190f13d6889.exe"C:\Users\Admin\AppData\Local\Temp\5d6ce35a1c2db1d5777b4190f13d6889.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\5d6ce35a1c2db1d5777b4190f13d6889.exeC:\Users\Admin\AppData\Local\Temp\5d6ce35a1c2db1d5777b4190f13d6889.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2832
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5da037536ea53f78ee2f0797ce30cbd99
SHA1799f78809022fa967176108a5edeea0b25d2e38c
SHA256d85a840ec66a8629b72aa2def9b66b076954a63fe8dec604c5977d6a320964ae
SHA512a850552d62b22eb9f49b8efa24f8206269c098594e476fde6365fef21816f4a381a2f7b972d0584a9054fbaef39eb953eb5b5b7f82d7b11c310257b2e8305a33