Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
05332eab7039a0fec21a198efb7dc6ce.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
05332eab7039a0fec21a198efb7dc6ce.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
05332eab7039a0fec21a198efb7dc6ce.exe
-
Size
132KB
-
MD5
05332eab7039a0fec21a198efb7dc6ce
-
SHA1
1d0f7d419515779c2c7a43347f6f44218b17cf17
-
SHA256
46ef2297b15024766e958dde8e67a007e9bfac407bdc6d972be6ccbe977728a2
-
SHA512
88a032817180788c5fa2df6e9113b75077bbb84b74be9d493f80da04894e40ba3418ea6cb60183bb5ca8b893282a9960582b7d5d733d9f872cc3df4a1fb3539d
-
SSDEEP
3072:BjeEUA4jVPv+4f291w48yvZwtZxp+u7smJc:B9U/v+4QWZz
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2168 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2264 svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\svchost.exe 05332eab7039a0fec21a198efb7dc6ce.exe File created C:\Windows\svchost.exe 05332eab7039a0fec21a198efb7dc6ce.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1576 05332eab7039a0fec21a198efb7dc6ce.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2168 1576 05332eab7039a0fec21a198efb7dc6ce.exe 17 PID 1576 wrote to memory of 2168 1576 05332eab7039a0fec21a198efb7dc6ce.exe 17 PID 1576 wrote to memory of 2168 1576 05332eab7039a0fec21a198efb7dc6ce.exe 17 PID 1576 wrote to memory of 2168 1576 05332eab7039a0fec21a198efb7dc6ce.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\05332eab7039a0fec21a198efb7dc6ce.exe"C:\Users\Admin\AppData\Local\Temp\05332eab7039a0fec21a198efb7dc6ce.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a11$$.bat2⤵
- Deletes itself
PID:2168
-
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe" /service1⤵
- Executes dropped EXE
PID:2264