Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
f6532b9c86777b8d891fdf2537ee1ae1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f6532b9c86777b8d891fdf2537ee1ae1.exe
Resource
win10v2004-20231215-en
General
-
Target
f6532b9c86777b8d891fdf2537ee1ae1.exe
-
Size
105KB
-
MD5
f6532b9c86777b8d891fdf2537ee1ae1
-
SHA1
de2a36477ec2dd690ab866ffcf725cbc20e5021d
-
SHA256
a4922876ed703f061c0fada8bca98209a50484a8be1d10ebdce03ac1e11a6de4
-
SHA512
e729fb02023f143960815a61cdf3e9abcd1090862f37a59a0e4cdfa99b401077fc09621800984b850c4855a283c0b13a12677c1919ce9d42b48b5f58d1d09ed0
-
SSDEEP
1536:+EVdVtuJ2vkwCNl/7f+f/zPNdUIjkIw7NWLiTt6DtW9YH:tVdVtugYD+f/LNdHIp7epW9i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2832 f6532b9c86777b8d891fdf2537ee1ae1.exe -
Executes dropped EXE 1 IoCs
pid Process 2832 f6532b9c86777b8d891fdf2537ee1ae1.exe -
Loads dropped DLL 1 IoCs
pid Process 2132 f6532b9c86777b8d891fdf2537ee1ae1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2132 f6532b9c86777b8d891fdf2537ee1ae1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2132 f6532b9c86777b8d891fdf2537ee1ae1.exe 2832 f6532b9c86777b8d891fdf2537ee1ae1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2832 2132 f6532b9c86777b8d891fdf2537ee1ae1.exe 29 PID 2132 wrote to memory of 2832 2132 f6532b9c86777b8d891fdf2537ee1ae1.exe 29 PID 2132 wrote to memory of 2832 2132 f6532b9c86777b8d891fdf2537ee1ae1.exe 29 PID 2132 wrote to memory of 2832 2132 f6532b9c86777b8d891fdf2537ee1ae1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6532b9c86777b8d891fdf2537ee1ae1.exe"C:\Users\Admin\AppData\Local\Temp\f6532b9c86777b8d891fdf2537ee1ae1.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\f6532b9c86777b8d891fdf2537ee1ae1.exeC:\Users\Admin\AppData\Local\Temp\f6532b9c86777b8d891fdf2537ee1ae1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2832
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5e51b8c417c2b3f284845186b5acf9493
SHA1b742066e814aca401c22f6f1b68aa3b36f6a69cc
SHA25646143c5f508f3241826532313eb33a02ce01e9102bcaab0ddd43ffb8a81e35a0
SHA512db020ff04a31309fcd4a9774410b56aeb63ace3379822f988d076d5ec2e4f09d05e448ad9086594d3058d4d33f2be58fa6fff340a02d294b150eae36d485785d