Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:27
Behavioral task
behavioral1
Sample
05956cbb7e95f4089d4565ba2250c82b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
05956cbb7e95f4089d4565ba2250c82b.exe
Resource
win10v2004-20231215-en
General
-
Target
05956cbb7e95f4089d4565ba2250c82b.exe
-
Size
2.6MB
-
MD5
05956cbb7e95f4089d4565ba2250c82b
-
SHA1
3b9beceda066e7b26d605d9909750e7c76b40ba3
-
SHA256
506fdb6f347fd3b37b8cfbf715df9deef9f340f5a23e7896253cad2961268348
-
SHA512
ed65b352468fd1277ddd81d35fe17e69cdb8b6369d4e722419bd946c7029698557099d3b99d76b5a20052485fe366d13bb7ea6c7be097b2b0d2945dc5e67dc46
-
SSDEEP
49152:xi8tlfsiJCDNIUgWKFzzYxLXdE7vTGa8pc2Zpp5Hat8bKqkbqay3:rW61UgvIeqcYpp5UQKW3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2984 05956cbb7e95f4089d4565ba2250c82b.exe -
Executes dropped EXE 1 IoCs
pid Process 2984 05956cbb7e95f4089d4565ba2250c82b.exe -
Loads dropped DLL 1 IoCs
pid Process 2548 05956cbb7e95f4089d4565ba2250c82b.exe -
resource yara_rule behavioral1/memory/2548-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral1/files/0x000b000000015df1-14.dat upx behavioral1/files/0x000b000000015df1-13.dat upx behavioral1/files/0x000b000000015df1-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2548 05956cbb7e95f4089d4565ba2250c82b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2548 05956cbb7e95f4089d4565ba2250c82b.exe 2984 05956cbb7e95f4089d4565ba2250c82b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2984 2548 05956cbb7e95f4089d4565ba2250c82b.exe 28 PID 2548 wrote to memory of 2984 2548 05956cbb7e95f4089d4565ba2250c82b.exe 28 PID 2548 wrote to memory of 2984 2548 05956cbb7e95f4089d4565ba2250c82b.exe 28 PID 2548 wrote to memory of 2984 2548 05956cbb7e95f4089d4565ba2250c82b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\05956cbb7e95f4089d4565ba2250c82b.exe"C:\Users\Admin\AppData\Local\Temp\05956cbb7e95f4089d4565ba2250c82b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\05956cbb7e95f4089d4565ba2250c82b.exeC:\Users\Admin\AppData\Local\Temp\05956cbb7e95f4089d4565ba2250c82b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2984
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
894KB
MD52d5ee1fc019e605c968d6cb60d42a908
SHA184545faddd7c69aa703802f8227ad0c7a1110e4d
SHA2563c32db078dca251f365083ba54ced789d6f58623c808527e068ee7eb897c24d2
SHA512949148283eeb07c204e10198fbe69e2c21702dbd67fb295e3d56a7e0fd6a100a7303bd694f367920fde9c73baa921bd8634f12bcb8348c4885f2f3e7cd85efb0
-
Filesize
893KB
MD5a337c25d24d500986b060c6fab2a18fa
SHA152f86b9c9c81bcac4b6c65b6aae052958ae6d923
SHA2564cd09ad568f2bc1c38c030bc6a5c7f28bc431232c0ca7bb4ba35c54ec516acae
SHA51206c909acfab97dafae811e6d104e8b14412681a7f2f4104cd879dc0a72f0bc49d6f1f915ff99b6ed1ae0ed5f5b5e0b251b2987d04bf677456a473bfa0405661d
-
Filesize
1.2MB
MD5af3d6888be6b66e93e2656b1f15dd3da
SHA1d4736ea957d94104ff92c5f3f46c9463f906801c
SHA256558fba7d73c9e8da8d9491e29c0197fae1b46533e6e4214055dee1b0f5153a88
SHA512fd107b33e21414124aa4ba546ff46fd572f6992b639859e4af9a883c788f31da1940498380cbe910a75430db798e2a2478d7c5b86905e88547b19f35b3ad118c