Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:23
Behavioral task
behavioral1
Sample
0055e30c0adbcca8bccb6a9f679b4d66.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0055e30c0adbcca8bccb6a9f679b4d66.exe
Resource
win10v2004-20231215-en
General
-
Target
0055e30c0adbcca8bccb6a9f679b4d66.exe
-
Size
1.3MB
-
MD5
0055e30c0adbcca8bccb6a9f679b4d66
-
SHA1
681c4b5059414c67dc259439bfe990b8eb90e4ce
-
SHA256
69994a9da037da4248ba1a3be10d40f95671a7d6499b4cbee2f8343ffa2f4142
-
SHA512
b281449b7822c48e9b4db64792167ae787b2ec60104804656770f967cf2bf67665e552f4db7149cc0efef633ba362e8835a877c1ed96e2b2f6771831de546ab0
-
SSDEEP
24576:N9X5efJmYo9NzwNiEJjyBIgBOUK4uUY38Uq8/FlRg25BLvG:NV3PiiNIgBNK4HY38olRg2z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2844 0055e30c0adbcca8bccb6a9f679b4d66.exe -
Executes dropped EXE 1 IoCs
pid Process 2844 0055e30c0adbcca8bccb6a9f679b4d66.exe -
Loads dropped DLL 1 IoCs
pid Process 2936 0055e30c0adbcca8bccb6a9f679b4d66.exe -
resource yara_rule behavioral1/memory/2936-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x0009000000015b6f-16.dat upx behavioral1/files/0x0009000000015b6f-13.dat upx behavioral1/files/0x0009000000015b6f-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2936 0055e30c0adbcca8bccb6a9f679b4d66.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2936 0055e30c0adbcca8bccb6a9f679b4d66.exe 2844 0055e30c0adbcca8bccb6a9f679b4d66.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2844 2936 0055e30c0adbcca8bccb6a9f679b4d66.exe 28 PID 2936 wrote to memory of 2844 2936 0055e30c0adbcca8bccb6a9f679b4d66.exe 28 PID 2936 wrote to memory of 2844 2936 0055e30c0adbcca8bccb6a9f679b4d66.exe 28 PID 2936 wrote to memory of 2844 2936 0055e30c0adbcca8bccb6a9f679b4d66.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0055e30c0adbcca8bccb6a9f679b4d66.exe"C:\Users\Admin\AppData\Local\Temp\0055e30c0adbcca8bccb6a9f679b4d66.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\0055e30c0adbcca8bccb6a9f679b4d66.exeC:\Users\Admin\AppData\Local\Temp\0055e30c0adbcca8bccb6a9f679b4d66.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2844
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d272ce15475b6bcdd5f21e7e104779ad
SHA1595a4b8e5d47a423c0e0dc4c1c9fb9836fffabbd
SHA2569001e0bb973050423302cfbccb782eadb775c4f572c623e7df6a67734aecec58
SHA512aeca6876ee4e249a9110268c71b3687dd97f614d0b37793e04b0d701d56274184a72b989d8f4d4508f24a48198457fb2a0c5d9dfed97f746ccc0f4f18ec5849e
-
Filesize
894KB
MD507de916ad3faa804291259ace4ad7069
SHA185ad8ddd0c17713a9b7ef384e8a888b403f9b5a5
SHA256047601e4c0f3d5a51e2b727bcb5830db1ca7363640102266afb5899604d4e9ef
SHA512cdc90b18bbd09db01f777664b859db2e8cc17ac2ef64d827080cdd8047b7e6bba18013d79e76874e1ebda9ce425d386227e1ec0f4fb08bab0f2e762abc6ad439
-
Filesize
1.3MB
MD59e609c156c27461f797974a5238ef039
SHA1b9f3d5311edf6ea5d9fea5ae636b1f0fe4976da3
SHA2560dd344009b9d5d28f8b58f70470c6b9fe34bdabdb4c230fb2fb750a27acf4d03
SHA5126aabc619d8ccde804ccf4cba1d01cc0d9a33925eb0cd3269fc03e08a0cdd31ff9dc054391812ae4fb9260fa7aa6dee051d0697bc061e0b8e1381b1adcaca8de1