Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 15:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7ac2eda72fb54fa7affa8c7f802ac3c6.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7ac2eda72fb54fa7affa8c7f802ac3c6.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
7ac2eda72fb54fa7affa8c7f802ac3c6.exe
-
Size
84KB
-
MD5
7ac2eda72fb54fa7affa8c7f802ac3c6
-
SHA1
a13153797adb79692ab67ee1a570992361e99e32
-
SHA256
148f9323bfa012015d99745e7920268dfa39750704abf2e544dafc26a11aa29b
-
SHA512
7ec5f47eaba7a335a1a1ed3f3fb5a5160afd4fa8d0367f178718b0db52a864b6acc0cb5b977399acafb4b1e425a55ade95f08ad04ec6b6eef2ff7421ac0ac7ac
-
SSDEEP
1536:nSgy19JSVO1ONn511/tiOJXZzOmRkFOCWkdZnB5F2WQjtzSKQ8D0:nS7BE51XiOJpzOckFOi/B5FnEzTQT
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2336 wiv1u5.exe 2272 p58kad.exe 2668 muoi9p9.exe 2824 678rg7a.exe 2696 19b1c50.exe 2800 jj8g7.exe 2892 s2d56s.exe 2616 7w9412b.exe 2576 pu2x39.exe 2684 f1bewjp.exe 2244 qvl54.exe 1344 659a78p.exe 2912 i3uc2et.exe 2940 84kpme.exe 2760 wo3ci9.exe 904 6r6969.exe 2044 59q6i1.exe 2460 fbjh3.exe 1528 k2k713.exe 792 9s70s.exe 556 9vwi1k.exe 2852 ipfbd.exe 2024 ibxtd5.exe 1516 ut1w26i.exe 1808 3x3qv.exe 2396 hw7w1.exe 2000 5x99q1.exe 2308 9aj5eq.exe 2092 xg329d7.exe 584 jg652c1.exe 1212 k6g9e.exe 432 21329cj.exe 340 h3315.exe 1048 594qqkt.exe 1144 0mgis9t.exe 1860 ne5ep7.exe 388 3n2a52.exe 516 8lig75m.exe 1676 51kge3.exe 2220 797j8.exe 2480 915q9e.exe 2120 i630n9.exe 1788 g2qb9c.exe 2484 bu14ws4.exe 1924 591773.exe 2504 c6j9go5.exe 1992 5x936m1.exe 2336 ku9nu4.exe 2692 e35eq9.exe 2708 83v6i3.exe 2716 gcb9av8.exe 2264 xo972.exe 2568 7371717.exe 2584 hwc33g3.exe 2608 uto971.exe 2780 ok0ct95.exe 2612 3ksa4.exe 2580 g6s7p.exe 1776 c1bnhjf.exe 2384 a98l1.exe 2424 67dgk12.exe 2908 von5r.exe 2888 1gqf7jw.exe 3056 ti6cm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2336 2404 7ac2eda72fb54fa7affa8c7f802ac3c6.exe 28 PID 2404 wrote to memory of 2336 2404 7ac2eda72fb54fa7affa8c7f802ac3c6.exe 28 PID 2404 wrote to memory of 2336 2404 7ac2eda72fb54fa7affa8c7f802ac3c6.exe 28 PID 2404 wrote to memory of 2336 2404 7ac2eda72fb54fa7affa8c7f802ac3c6.exe 28 PID 2336 wrote to memory of 2272 2336 wiv1u5.exe 29 PID 2336 wrote to memory of 2272 2336 wiv1u5.exe 29 PID 2336 wrote to memory of 2272 2336 wiv1u5.exe 29 PID 2336 wrote to memory of 2272 2336 wiv1u5.exe 29 PID 2272 wrote to memory of 2668 2272 p58kad.exe 30 PID 2272 wrote to memory of 2668 2272 p58kad.exe 30 PID 2272 wrote to memory of 2668 2272 p58kad.exe 30 PID 2272 wrote to memory of 2668 2272 p58kad.exe 30 PID 2668 wrote to memory of 2824 2668 muoi9p9.exe 31 PID 2668 wrote to memory of 2824 2668 muoi9p9.exe 31 PID 2668 wrote to memory of 2824 2668 muoi9p9.exe 31 PID 2668 wrote to memory of 2824 2668 muoi9p9.exe 31 PID 2824 wrote to memory of 2696 2824 678rg7a.exe 32 PID 2824 wrote to memory of 2696 2824 678rg7a.exe 32 PID 2824 wrote to memory of 2696 2824 678rg7a.exe 32 PID 2824 wrote to memory of 2696 2824 678rg7a.exe 32 PID 2696 wrote to memory of 2800 2696 19b1c50.exe 33 PID 2696 wrote to memory of 2800 2696 19b1c50.exe 33 PID 2696 wrote to memory of 2800 2696 19b1c50.exe 33 PID 2696 wrote to memory of 2800 2696 19b1c50.exe 33 PID 2800 wrote to memory of 2892 2800 jj8g7.exe 34 PID 2800 wrote to memory of 2892 2800 jj8g7.exe 34 PID 2800 wrote to memory of 2892 2800 jj8g7.exe 34 PID 2800 wrote to memory of 2892 2800 jj8g7.exe 34 PID 2892 wrote to memory of 2616 2892 s2d56s.exe 35 PID 2892 wrote to memory of 2616 2892 s2d56s.exe 35 PID 2892 wrote to memory of 2616 2892 s2d56s.exe 35 PID 2892 wrote to memory of 2616 2892 s2d56s.exe 35 PID 2616 wrote to memory of 2576 2616 7w9412b.exe 36 PID 2616 wrote to memory of 2576 2616 7w9412b.exe 36 PID 2616 wrote to memory of 2576 2616 7w9412b.exe 36 PID 2616 wrote to memory of 2576 2616 7w9412b.exe 36 PID 2576 wrote to memory of 2684 2576 pu2x39.exe 37 PID 2576 wrote to memory of 2684 2576 pu2x39.exe 37 PID 2576 wrote to memory of 2684 2576 pu2x39.exe 37 PID 2576 wrote to memory of 2684 2576 pu2x39.exe 37 PID 2684 wrote to memory of 2244 2684 f1bewjp.exe 38 PID 2684 wrote to memory of 2244 2684 f1bewjp.exe 38 PID 2684 wrote to memory of 2244 2684 f1bewjp.exe 38 PID 2684 wrote to memory of 2244 2684 f1bewjp.exe 38 PID 2244 wrote to memory of 1344 2244 qvl54.exe 39 PID 2244 wrote to memory of 1344 2244 qvl54.exe 39 PID 2244 wrote to memory of 1344 2244 qvl54.exe 39 PID 2244 wrote to memory of 1344 2244 qvl54.exe 39 PID 1344 wrote to memory of 2912 1344 659a78p.exe 40 PID 1344 wrote to memory of 2912 1344 659a78p.exe 40 PID 1344 wrote to memory of 2912 1344 659a78p.exe 40 PID 1344 wrote to memory of 2912 1344 659a78p.exe 40 PID 2912 wrote to memory of 2940 2912 i3uc2et.exe 41 PID 2912 wrote to memory of 2940 2912 i3uc2et.exe 41 PID 2912 wrote to memory of 2940 2912 i3uc2et.exe 41 PID 2912 wrote to memory of 2940 2912 i3uc2et.exe 41 PID 2940 wrote to memory of 2760 2940 84kpme.exe 42 PID 2940 wrote to memory of 2760 2940 84kpme.exe 42 PID 2940 wrote to memory of 2760 2940 84kpme.exe 42 PID 2940 wrote to memory of 2760 2940 84kpme.exe 42 PID 2760 wrote to memory of 904 2760 wo3ci9.exe 43 PID 2760 wrote to memory of 904 2760 wo3ci9.exe 43 PID 2760 wrote to memory of 904 2760 wo3ci9.exe 43 PID 2760 wrote to memory of 904 2760 wo3ci9.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ac2eda72fb54fa7affa8c7f802ac3c6.exe"C:\Users\Admin\AppData\Local\Temp\7ac2eda72fb54fa7affa8c7f802ac3c6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\wiv1u5.exec:\wiv1u5.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
\??\c:\p58kad.exec:\p58kad.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
\??\c:\muoi9p9.exec:\muoi9p9.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\678rg7a.exec:\678rg7a.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\19b1c50.exec:\19b1c50.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\jj8g7.exec:\jj8g7.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\s2d56s.exec:\s2d56s.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\7w9412b.exec:\7w9412b.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\pu2x39.exec:\pu2x39.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
\??\c:\f1bewjp.exec:\f1bewjp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\qvl54.exec:\qvl54.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
\??\c:\659a78p.exec:\659a78p.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1344 -
\??\c:\i3uc2et.exec:\i3uc2et.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\84kpme.exec:\84kpme.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\wo3ci9.exec:\wo3ci9.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\6r6969.exec:\6r6969.exe17⤵
- Executes dropped EXE
PID:904 -
\??\c:\59q6i1.exec:\59q6i1.exe18⤵
- Executes dropped EXE
PID:2044 -
\??\c:\fbjh3.exec:\fbjh3.exe19⤵
- Executes dropped EXE
PID:2460 -
\??\c:\k2k713.exec:\k2k713.exe20⤵
- Executes dropped EXE
PID:1528 -
\??\c:\9s70s.exec:\9s70s.exe21⤵
- Executes dropped EXE
PID:792 -
\??\c:\9vwi1k.exec:\9vwi1k.exe22⤵
- Executes dropped EXE
PID:556 -
\??\c:\ipfbd.exec:\ipfbd.exe23⤵
- Executes dropped EXE
PID:2852 -
\??\c:\ibxtd5.exec:\ibxtd5.exe24⤵
- Executes dropped EXE
PID:2024 -
\??\c:\ut1w26i.exec:\ut1w26i.exe25⤵
- Executes dropped EXE
PID:1516 -
\??\c:\3x3qv.exec:\3x3qv.exe26⤵
- Executes dropped EXE
PID:1808 -
\??\c:\hw7w1.exec:\hw7w1.exe27⤵
- Executes dropped EXE
PID:2396 -
\??\c:\5x99q1.exec:\5x99q1.exe28⤵
- Executes dropped EXE
PID:2000 -
\??\c:\9aj5eq.exec:\9aj5eq.exe29⤵
- Executes dropped EXE
PID:2308 -
\??\c:\xg329d7.exec:\xg329d7.exe30⤵
- Executes dropped EXE
PID:2092 -
\??\c:\jg652c1.exec:\jg652c1.exe31⤵
- Executes dropped EXE
PID:584 -
\??\c:\k6g9e.exec:\k6g9e.exe32⤵
- Executes dropped EXE
PID:1212 -
\??\c:\21329cj.exec:\21329cj.exe33⤵
- Executes dropped EXE
PID:432 -
\??\c:\h3315.exec:\h3315.exe34⤵
- Executes dropped EXE
PID:340 -
\??\c:\594qqkt.exec:\594qqkt.exe35⤵
- Executes dropped EXE
PID:1048 -
\??\c:\0mgis9t.exec:\0mgis9t.exe36⤵
- Executes dropped EXE
PID:1144 -
\??\c:\ne5ep7.exec:\ne5ep7.exe37⤵
- Executes dropped EXE
PID:1860 -
\??\c:\3n2a52.exec:\3n2a52.exe38⤵
- Executes dropped EXE
PID:388 -
\??\c:\8lig75m.exec:\8lig75m.exe39⤵
- Executes dropped EXE
PID:516 -
\??\c:\51kge3.exec:\51kge3.exe40⤵
- Executes dropped EXE
PID:1676 -
\??\c:\797j8.exec:\797j8.exe41⤵
- Executes dropped EXE
PID:2220 -
\??\c:\915q9e.exec:\915q9e.exe42⤵
- Executes dropped EXE
PID:2480 -
\??\c:\i630n9.exec:\i630n9.exe43⤵
- Executes dropped EXE
PID:2120 -
\??\c:\g2qb9c.exec:\g2qb9c.exe44⤵
- Executes dropped EXE
PID:1788 -
\??\c:\bu14ws4.exec:\bu14ws4.exe45⤵
- Executes dropped EXE
PID:2484 -
\??\c:\591773.exec:\591773.exe46⤵
- Executes dropped EXE
PID:1924 -
\??\c:\c6j9go5.exec:\c6j9go5.exe47⤵
- Executes dropped EXE
PID:2504 -
\??\c:\5x936m1.exec:\5x936m1.exe48⤵
- Executes dropped EXE
PID:1992 -
\??\c:\ku9nu4.exec:\ku9nu4.exe49⤵
- Executes dropped EXE
PID:2336 -
\??\c:\e35eq9.exec:\e35eq9.exe50⤵
- Executes dropped EXE
PID:2692 -
\??\c:\83v6i3.exec:\83v6i3.exe51⤵
- Executes dropped EXE
PID:2708 -
\??\c:\gcb9av8.exec:\gcb9av8.exe52⤵
- Executes dropped EXE
PID:2716 -
\??\c:\xo972.exec:\xo972.exe53⤵
- Executes dropped EXE
PID:2264 -
\??\c:\7371717.exec:\7371717.exe54⤵
- Executes dropped EXE
PID:2568 -
\??\c:\hwc33g3.exec:\hwc33g3.exe55⤵
- Executes dropped EXE
PID:2584 -
\??\c:\uto971.exec:\uto971.exe56⤵
- Executes dropped EXE
PID:2608 -
\??\c:\ok0ct95.exec:\ok0ct95.exe57⤵
- Executes dropped EXE
PID:2780 -
\??\c:\3ksa4.exec:\3ksa4.exe58⤵
- Executes dropped EXE
PID:2612 -
\??\c:\g6s7p.exec:\g6s7p.exe59⤵
- Executes dropped EXE
PID:2580 -
\??\c:\c1bnhjf.exec:\c1bnhjf.exe60⤵
- Executes dropped EXE
PID:1776 -
\??\c:\a98l1.exec:\a98l1.exe61⤵
- Executes dropped EXE
PID:2384 -
\??\c:\67dgk12.exec:\67dgk12.exe62⤵
- Executes dropped EXE
PID:2424 -
\??\c:\von5r.exec:\von5r.exe63⤵
- Executes dropped EXE
PID:2908 -
\??\c:\1gqf7jw.exec:\1gqf7jw.exe64⤵
- Executes dropped EXE
PID:2888 -
\??\c:\ti6cm.exec:\ti6cm.exe65⤵
- Executes dropped EXE
PID:3056 -
\??\c:\95sc5m.exec:\95sc5m.exe66⤵PID:3052
-
\??\c:\lw3w56q.exec:\lw3w56q.exe67⤵PID:2172
-
\??\c:\fs17k.exec:\fs17k.exe68⤵PID:2176
-
\??\c:\h7u6alk.exec:\h7u6alk.exe69⤵PID:364
-
\??\c:\7w7eu8.exec:\7w7eu8.exe70⤵PID:2144
-
\??\c:\2bdp76.exec:\2bdp76.exe71⤵PID:2548
-
\??\c:\qc4ka49.exec:\qc4ka49.exe72⤵PID:684
-
\??\c:\i6111.exec:\i6111.exe73⤵PID:764
-
\??\c:\q5mo3.exec:\q5mo3.exe74⤵PID:1472
-
\??\c:\9lhh05m.exec:\9lhh05m.exe75⤵PID:1116
-
\??\c:\9075r8.exec:\9075r8.exe76⤵PID:2840
-
\??\c:\x16kf7.exec:\x16kf7.exe77⤵PID:616
-
\??\c:\nu37e.exec:\nu37e.exe78⤵PID:2024
-
\??\c:\a6oc5u9.exec:\a6oc5u9.exe79⤵PID:1248
-
\??\c:\46d44.exec:\46d44.exe80⤵PID:1396
-
\??\c:\s8skw.exec:\s8skw.exe81⤵PID:2060
-
\??\c:\fsh1am.exec:\fsh1am.exe82⤵PID:1148
-
\??\c:\g8gmu.exec:\g8gmu.exe83⤵PID:1760
-
\??\c:\fsp13m.exec:\fsp13m.exe84⤵PID:2068
-
\??\c:\k0c7o.exec:\k0c7o.exe85⤵PID:1844
-
\??\c:\7757wk.exec:\7757wk.exe86⤵PID:2600
-
\??\c:\07gs19.exec:\07gs19.exe87⤵PID:1668
-
\??\c:\97i1a.exec:\97i1a.exe88⤵PID:2464
-
\??\c:\a56a1ec.exec:\a56a1ec.exe89⤵PID:1912
-
\??\c:\6n365pn.exec:\6n365pn.exe90⤵PID:1856
-
\??\c:\acvo7eb.exec:\acvo7eb.exe91⤵PID:856
-
\??\c:\5ak3q.exec:\5ak3q.exe92⤵PID:828
-
\??\c:\468w0bv.exec:\468w0bv.exe93⤵PID:892
-
\??\c:\80oscc.exec:\80oscc.exe94⤵PID:1784
-
\??\c:\41wum.exec:\41wum.exe95⤵PID:812
-
\??\c:\p78i0o5.exec:\p78i0o5.exe96⤵PID:1936
-
\??\c:\66336l.exec:\66336l.exe97⤵PID:2240
-
\??\c:\17l84.exec:\17l84.exe98⤵PID:1864
-
\??\c:\6q14s33.exec:\6q14s33.exe99⤵PID:1600
-
\??\c:\jcqc9.exec:\jcqc9.exe100⤵PID:1608
-
\??\c:\hb1qls.exec:\hb1qls.exe101⤵PID:2404
-
\??\c:\k0woj1.exec:\k0woj1.exe102⤵PID:2332
-
\??\c:\977a1.exec:\977a1.exe103⤵PID:2372
-
\??\c:\i18a16k.exec:\i18a16k.exe104⤵PID:2796
-
\??\c:\oead6a3.exec:\oead6a3.exe105⤵PID:2708
-
\??\c:\600w1c.exec:\600w1c.exe106⤵PID:2812
-
\??\c:\e0kmp.exec:\e0kmp.exe107⤵PID:2864
-
\??\c:\u10c36q.exec:\u10c36q.exe108⤵PID:2696
-
\??\c:\57u1w.exec:\57u1w.exe109⤵PID:2700
-
\??\c:\9156g9.exec:\9156g9.exe110⤵PID:2676
-
\??\c:\jd6i1.exec:\jd6i1.exe111⤵PID:2868
-
\??\c:\ikww0.exec:\ikww0.exe112⤵PID:2604
-
\??\c:\luf7v3.exec:\luf7v3.exe113⤵PID:2580
-
\??\c:\e9nn43.exec:\e9nn43.exe114⤵PID:2684
-
\??\c:\g5gp1.exec:\g5gp1.exe115⤵PID:2384
-
\??\c:\bnxk3b.exec:\bnxk3b.exe116⤵PID:1956
-
\??\c:\24ouj.exec:\24ouj.exe117⤵PID:2908
-
\??\c:\32cpq.exec:\32cpq.exe118⤵PID:2936
-
\??\c:\bi13f5.exec:\bi13f5.exe119⤵PID:2920
-
\??\c:\rrio71.exec:\rrio71.exe120⤵PID:3052
-
\??\c:\g7efu5.exec:\g7efu5.exe121⤵PID:3060
-
\??\c:\7qw5i1.exec:\7qw5i1.exe122⤵PID:880
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-