Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
00ef8c01edba099c8675d1f9a3aa60ca.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
00ef8c01edba099c8675d1f9a3aa60ca.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
00ef8c01edba099c8675d1f9a3aa60ca.exe
-
Size
936KB
-
MD5
00ef8c01edba099c8675d1f9a3aa60ca
-
SHA1
cbe326c6be08866f78dafb3c4e826c9e92b3d1ab
-
SHA256
dec274c45f76a73a37d054c9ab07537e8ef5c6082782a874eb56b4a397e2ccc6
-
SHA512
7d3629debb9a5e948926516dcf51e78a54e00c00ae6a05077aa1608422c54a3d588f4165c2162875c6f022e28fdb3208addaa788fa43ec08c9a3e118d005e04a
-
SSDEEP
12288:MLry/neyx7f/A64j7PYV3H/BxJsQYrFy698hi2hT4wgfP3xeb01jQwelN1U:qKeyxTAJj7PYJvYN9+i2Z4wWht5BM0
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 elunmrezrvqr.exe -
Loads dropped DLL 1 IoCs
pid Process 2808 00ef8c01edba099c8675d1f9a3aa60ca.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\mjvufbqyw\elunmrezrvqr.exe 00ef8c01edba099c8675d1f9a3aa60ca.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2744 2808 00ef8c01edba099c8675d1f9a3aa60ca.exe 14 PID 2808 wrote to memory of 2744 2808 00ef8c01edba099c8675d1f9a3aa60ca.exe 14 PID 2808 wrote to memory of 2744 2808 00ef8c01edba099c8675d1f9a3aa60ca.exe 14 PID 2808 wrote to memory of 2744 2808 00ef8c01edba099c8675d1f9a3aa60ca.exe 14
Processes
-
C:\Program Files (x86)\mjvufbqyw\elunmrezrvqr.exe"C:\Program Files (x86)\mjvufbqyw\elunmrezrvqr.exe"1⤵
- Executes dropped EXE
PID:2744
-
C:\Users\Admin\AppData\Local\Temp\00ef8c01edba099c8675d1f9a3aa60ca.exe"C:\Users\Admin\AppData\Local\Temp\00ef8c01edba099c8675d1f9a3aa60ca.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2808