Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:52
Behavioral task
behavioral1
Sample
07a08c629f834608f3867db38b39ab40.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07a08c629f834608f3867db38b39ab40.exe
Resource
win10v2004-20231215-en
General
-
Target
07a08c629f834608f3867db38b39ab40.exe
-
Size
85KB
-
MD5
07a08c629f834608f3867db38b39ab40
-
SHA1
b0e272eeb5ef4b1e4622e308850ca0b14378b0f8
-
SHA256
6f7e397a1303196f6e6cd6d060b994bdef644bd0ca319bc8ca381e15bc563a20
-
SHA512
fb78e24df1087ea6e37c353140e4acd796cef82acb131f45def70a4ea99196d4880f0b6eab9ef49f87e817af2d897540400115df8ab96a90f5f53208222b4a0d
-
SSDEEP
1536:++/y8Y1fmebDyq4+F2SSXgxiIlA56D3P8aiOsWrWwKc8:++c1fmenyqpRiIl/rP8ad7WwKH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2768 cmd.exe -
resource yara_rule behavioral1/memory/1672-0-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1672-2-0x0000000000400000-0x0000000000435000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2768 1672 07a08c629f834608f3867db38b39ab40.exe 20 PID 1672 wrote to memory of 2768 1672 07a08c629f834608f3867db38b39ab40.exe 20 PID 1672 wrote to memory of 2768 1672 07a08c629f834608f3867db38b39ab40.exe 20 PID 1672 wrote to memory of 2768 1672 07a08c629f834608f3867db38b39ab40.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\07a08c629f834608f3867db38b39ab40.exe"C:\Users\Admin\AppData\Local\Temp\07a08c629f834608f3867db38b39ab40.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\44AE.tmp.bat" > nul 2> nul2⤵
- Deletes itself
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5fa4df724828f33eeaf0922eab91bf811
SHA1192e880e7e599f8f9b63e44539e0b29dd94dd83a
SHA25637c9093c83bf338dfe7ff1a8c0e2a735d154f0c829069fc9d1196d8edfa646ae
SHA5123ff6f3d5fae140b691ffd5dcf9f8466db376fa231cdca215123dd6d4f827e2c73ac2f186f1d59d70c06bf350f2f9f58a7651ab4d16bf9235c889617a099fc7a9