Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
79025f8ce6e83f1d74ccef3c1b3fc227.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
79025f8ce6e83f1d74ccef3c1b3fc227.exe
Resource
win10v2004-20231215-en
General
-
Target
79025f8ce6e83f1d74ccef3c1b3fc227.exe
-
Size
12KB
-
MD5
79025f8ce6e83f1d74ccef3c1b3fc227
-
SHA1
c35cc7cec2733ee39f3e5a265f97b56664e91b37
-
SHA256
e4d6af95ec6534bf12a9c32517abc9d4e98aeed62cf28934de293dcbcca8c591
-
SHA512
af89e4eb3dbf9a5da35a627335a28d48b5093810d1f39e1a648c3b0eab3b0ad296eac9eee6aa17ec999bb28c671b67c39fffdfb2780c8081c575ce360335a704
-
SSDEEP
384:jm9zDrAR4WWlro9ctdflCU52iGJwsAaO5zQ:jusrWlkyPfV5HG2s9O
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2980 svohost.exe -
Loads dropped DLL 2 IoCs
pid Process 2912 79025f8ce6e83f1d74ccef3c1b3fc227.exe 2912 79025f8ce6e83f1d74ccef3c1b3fc227.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\DukeGame.dll 79025f8ce6e83f1d74ccef3c1b3fc227.exe File created C:\Program Files\svohost.exe 79025f8ce6e83f1d74ccef3c1b3fc227.exe File opened for modification C:\Program Files\svohost.exe 79025f8ce6e83f1d74ccef3c1b3fc227.exe File opened for modification C:\Program Files\DukeGame.dll svohost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2980 2912 79025f8ce6e83f1d74ccef3c1b3fc227.exe 18 PID 2912 wrote to memory of 2980 2912 79025f8ce6e83f1d74ccef3c1b3fc227.exe 18 PID 2912 wrote to memory of 2980 2912 79025f8ce6e83f1d74ccef3c1b3fc227.exe 18 PID 2912 wrote to memory of 2980 2912 79025f8ce6e83f1d74ccef3c1b3fc227.exe 18 PID 2912 wrote to memory of 3052 2912 79025f8ce6e83f1d74ccef3c1b3fc227.exe 17 PID 2912 wrote to memory of 3052 2912 79025f8ce6e83f1d74ccef3c1b3fc227.exe 17 PID 2912 wrote to memory of 3052 2912 79025f8ce6e83f1d74ccef3c1b3fc227.exe 17 PID 2912 wrote to memory of 3052 2912 79025f8ce6e83f1d74ccef3c1b3fc227.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\79025f8ce6e83f1d74ccef3c1b3fc227.exe"C:\Users\Admin\AppData\Local\Temp\79025f8ce6e83f1d74ccef3c1b3fc227.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.execmd /c delself.bat2⤵
- Deletes itself
PID:3052
-
-
C:\Program Files\svohost.exe"C:\Program Files\svohost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2980
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD53aea6d8639e983d576ba8994fa0fac72
SHA1ead9df0b4467eb257896d5119606d8c15377402e
SHA256b14e5db5b92249653f77b012d192f0a9b38be32015644971c91599047dc90621
SHA512440b2347c18f1431f68133014a0d26430b2e996f78d61e36e278a3fc7d9e413269b63401498520676f6f54f99a17d12fb09a793ae6b4ee00605d79991cb5b877
-
Filesize
12KB
MD579025f8ce6e83f1d74ccef3c1b3fc227
SHA1c35cc7cec2733ee39f3e5a265f97b56664e91b37
SHA256e4d6af95ec6534bf12a9c32517abc9d4e98aeed62cf28934de293dcbcca8c591
SHA512af89e4eb3dbf9a5da35a627335a28d48b5093810d1f39e1a648c3b0eab3b0ad296eac9eee6aa17ec999bb28c671b67c39fffdfb2780c8081c575ce360335a704
-
Filesize
86B
MD5d92f32ee92c06a3fdb4ed1dc326d87f1
SHA154998e02e38e0c6a35730753e8a56783a7bdd170
SHA2568a8be4804fdd38bde3bfae055fe080e3924c480e39574f21021b04856ce9f6ed
SHA512ef397b62086b080821e1d574bd6ba0cb6c554122217238d48ec64f8f78b88bd3a1e32ac14f6021dfa31632bdfe88ec8d3cd59a8e9abe1d05251b58b977472d62