Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:28
Behavioral task
behavioral1
Sample
031f5bab9d0527300cc9f32baa134d73.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
031f5bab9d0527300cc9f32baa134d73.exe
Resource
win10v2004-20231215-en
General
-
Target
031f5bab9d0527300cc9f32baa134d73.exe
-
Size
2.7MB
-
MD5
031f5bab9d0527300cc9f32baa134d73
-
SHA1
62b9406f70217c2cd295b841304f44e46e922107
-
SHA256
461b1e60ba8c1ca5b4219124573dd46cd7096af54bb4eea3a54c0a5de3c181b2
-
SHA512
cdcf200d9f40b5bd3986a97c62ce5d883200460abd1386702ec3a1eb3fd273c6ecc698bc1997aa941106fbbf266995457ac7074c3c8ce75b5a40e5b6e81f6196
-
SSDEEP
49152:q0t9mZmP9ou004CSjhkxLuXuO2t9rR9TJdlB4011X3rTEK4lhVMqJtKZJhJX9HRt:PvNX4CSjqxLCuOu9rHTJdzz1HrYK4nmh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2936 031f5bab9d0527300cc9f32baa134d73.exe -
Executes dropped EXE 1 IoCs
pid Process 2936 031f5bab9d0527300cc9f32baa134d73.exe -
Loads dropped DLL 1 IoCs
pid Process 1872 031f5bab9d0527300cc9f32baa134d73.exe -
resource yara_rule behavioral1/memory/2936-16-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x000900000001447e-13.dat upx behavioral1/files/0x000900000001447e-10.dat upx behavioral1/memory/1872-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1872 031f5bab9d0527300cc9f32baa134d73.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1872 031f5bab9d0527300cc9f32baa134d73.exe 2936 031f5bab9d0527300cc9f32baa134d73.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2936 1872 031f5bab9d0527300cc9f32baa134d73.exe 17 PID 1872 wrote to memory of 2936 1872 031f5bab9d0527300cc9f32baa134d73.exe 17 PID 1872 wrote to memory of 2936 1872 031f5bab9d0527300cc9f32baa134d73.exe 17 PID 1872 wrote to memory of 2936 1872 031f5bab9d0527300cc9f32baa134d73.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\031f5bab9d0527300cc9f32baa134d73.exe"C:\Users\Admin\AppData\Local\Temp\031f5bab9d0527300cc9f32baa134d73.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\031f5bab9d0527300cc9f32baa134d73.exeC:\Users\Admin\AppData\Local\Temp\031f5bab9d0527300cc9f32baa134d73.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
363KB
MD58e464f890696178a05885d96b0a61565
SHA1cf7628bc1076d4353feb305564f5e62fa7b5b837
SHA2563c1688ff538a9215e0daaa35235afbdecb75094bf7fc991804a916f9ad7e64f8
SHA51282690d39a125fecb00ec70f2675297a1b40892f6d635e6edc19b8cd1db030534b88536dd7c408cf47ec69a5f4e57d3510127b4556ea2964c237a420730fd7023
-
Filesize
410KB
MD5714c4413d41c98ac3a61f52011ef780c
SHA135b36b1ed066ef307b666b3a3f24b7f5168b3ded
SHA25641babcec931ec9a943db282a7f8a70f3401840c89a4a2d60abb25a8b5d04f070
SHA512a082b225080a33072c2043503cb341dddecb4b6867e711f8ab6e01050459e8e46a285a32b8e25971a2f5ce3c162447ff39f0e1274ae4e8c495e00c5860be9453