Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
71293ad2416b9a68bba63a729f87afb7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
71293ad2416b9a68bba63a729f87afb7.exe
Resource
win10v2004-20231222-en
General
-
Target
71293ad2416b9a68bba63a729f87afb7.exe
-
Size
88KB
-
MD5
71293ad2416b9a68bba63a729f87afb7
-
SHA1
6556526c71e5772593e299c46e5587dfe66b8cca
-
SHA256
07e4ea8429dce643bd2083f6053c656bfa3d994fee07b40897acb469cac0d68b
-
SHA512
3e5e1f712835ff531520b2e9fa12b7d4efbc17532be21306d5eaf63beb852a211ad7bd3becfa6a3ecdf935bdf5d812f2aa6103a427221e66b88dcbc478cd2534
-
SSDEEP
768:xg3+4NTlezZEatuHqLPkhEryY5USTMSuHcj19lmVWUE2q7NRbCxX5HoL3/QZZHwq:xu+4NeZmhtYhUKLPyQH2xEAAwT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1028 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1028 1712 71293ad2416b9a68bba63a729f87afb7.exe 29 PID 1712 wrote to memory of 1028 1712 71293ad2416b9a68bba63a729f87afb7.exe 29 PID 1712 wrote to memory of 1028 1712 71293ad2416b9a68bba63a729f87afb7.exe 29 PID 1712 wrote to memory of 1028 1712 71293ad2416b9a68bba63a729f87afb7.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\71293ad2416b9a68bba63a729f87afb7.exe"C:\Users\Admin\AppData\Local\Temp\71293ad2416b9a68bba63a729f87afb7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\71293ad2416b9a68bba63a729f87afb7.exe" >> NUL2⤵
- Deletes itself
PID:1028
-