Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 23:08
Static task
static1
Behavioral task
behavioral1
Sample
fee2e78301fbf5e0edd354c1794f9e7b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fee2e78301fbf5e0edd354c1794f9e7b.exe
Resource
win10v2004-20231215-en
General
-
Target
fee2e78301fbf5e0edd354c1794f9e7b.exe
-
Size
82KB
-
MD5
fee2e78301fbf5e0edd354c1794f9e7b
-
SHA1
3588721d6dfb505f4c279a778780220ebb574097
-
SHA256
c33aff373647e29453f029b81a78337aa51cf0ce898b8fc392a28484a296c6cc
-
SHA512
bb98ff7664e7362ef00f253eaabed78d68c316dd2c1e85ecd6c6f0d3c9b33a518bacb84dc122a046da477d0af2361f6081f4bb3b358f962f851d2dc01a8c75c0
-
SSDEEP
1536:21G5gM3INkqfZvUxPJLcO3aCLzYdaNayfvHyRQqjm794J2Tfjcz:UIgCdCZvUjLcOKyecp4Wfji
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1704 fee2e78301fbf5e0edd354c1794f9e7b.exe -
Executes dropped EXE 1 IoCs
pid Process 1704 fee2e78301fbf5e0edd354c1794f9e7b.exe -
Loads dropped DLL 1 IoCs
pid Process 2932 fee2e78301fbf5e0edd354c1794f9e7b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2932 fee2e78301fbf5e0edd354c1794f9e7b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2932 fee2e78301fbf5e0edd354c1794f9e7b.exe 1704 fee2e78301fbf5e0edd354c1794f9e7b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1704 2932 fee2e78301fbf5e0edd354c1794f9e7b.exe 29 PID 2932 wrote to memory of 1704 2932 fee2e78301fbf5e0edd354c1794f9e7b.exe 29 PID 2932 wrote to memory of 1704 2932 fee2e78301fbf5e0edd354c1794f9e7b.exe 29 PID 2932 wrote to memory of 1704 2932 fee2e78301fbf5e0edd354c1794f9e7b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\fee2e78301fbf5e0edd354c1794f9e7b.exe"C:\Users\Admin\AppData\Local\Temp\fee2e78301fbf5e0edd354c1794f9e7b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\fee2e78301fbf5e0edd354c1794f9e7b.exeC:\Users\Admin\AppData\Local\Temp\fee2e78301fbf5e0edd354c1794f9e7b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1704
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD54f26c248d88851a8a05b2a953a8e7ea7
SHA1ac482f075ed41d64b1a8a1f3936d7d4adbe25d2c
SHA256a1dc29723abed995b0a5da224043a3638b962057b51d7638ab132a07b0a87f4b
SHA5128ca48c97ab700b35b09a5cfa2b17d9e1add3e69cb45a042c887f28cf85edde7ad1b5f5fe6db86192212d66f0397f23517b72cb997f4082c3d1e03cadfb53a8aa