Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
035e661cf44d703d4deaa17e8ae4056b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
035e661cf44d703d4deaa17e8ae4056b.exe
Resource
win10v2004-20231215-en
General
-
Target
035e661cf44d703d4deaa17e8ae4056b.exe
-
Size
184KB
-
MD5
035e661cf44d703d4deaa17e8ae4056b
-
SHA1
3a2cada2581165090e136be230a3acaf2d0b40db
-
SHA256
f018bbb22303acfbddc04ba33d9d8c682ac08963788244233b92d9208bef6e16
-
SHA512
349df5bf7757b95e5cb8e7807019f8df177206975ec43294b9284ac6f881fcfab9dfa52ffed219e7065a7ee6c4c2fca8cf91870888c34e5283a666b6c6ecf616
-
SSDEEP
3072:l+1GoEN8XJA8kFjbwzOS08dbY8t6QSphfDMx+YdSUNlPvpFA:l+oobm8khwKS088TdUNlPvpF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2988 Unicorn-65015.exe -
Loads dropped DLL 7 IoCs
pid Process 2136 035e661cf44d703d4deaa17e8ae4056b.exe 2136 035e661cf44d703d4deaa17e8ae4056b.exe 3048 WerFault.exe 3048 WerFault.exe 3048 WerFault.exe 3048 WerFault.exe 3048 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process 3048 2988 WerFault.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2136 035e661cf44d703d4deaa17e8ae4056b.exe 2988 Unicorn-65015.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2988 2136 035e661cf44d703d4deaa17e8ae4056b.exe 29 PID 2136 wrote to memory of 2988 2136 035e661cf44d703d4deaa17e8ae4056b.exe 29 PID 2136 wrote to memory of 2988 2136 035e661cf44d703d4deaa17e8ae4056b.exe 29 PID 2136 wrote to memory of 2988 2136 035e661cf44d703d4deaa17e8ae4056b.exe 29 PID 2988 wrote to memory of 3048 2988 Unicorn-65015.exe 28 PID 2988 wrote to memory of 3048 2988 Unicorn-65015.exe 28 PID 2988 wrote to memory of 3048 2988 Unicorn-65015.exe 28 PID 2988 wrote to memory of 3048 2988 Unicorn-65015.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\035e661cf44d703d4deaa17e8ae4056b.exe"C:\Users\Admin\AppData\Local\Temp\035e661cf44d703d4deaa17e8ae4056b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65015.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 2001⤵
- Loads dropped DLL
- Program crash
PID:3048
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5e4045f4b3ab0c3388973f3617d7d0824
SHA1d781745b8fe1faac2491382887c313eb6c588ea7
SHA256512923c02e323e67c0b38d0f651b131a32a524d6a64f774f93ff8aaad8aadc06
SHA512e425399dee1971746c6479bb35ae450728fe5279629e9f55fce79b2ba301a7301e37818dbb836a7cb3400ebb1e5ca2866f8d34d88c178356b1d8fcd6448aba40
-
Filesize
93KB
MD5b6629a947fce02b5541d0101d325ae2b
SHA139151f8a953fd9447cf8d84278710aeadb6087f5
SHA2562e18d1ee3b748f5a76db56fdd4e00157a33d4afe5fb65142d2ea0a44561ae32f
SHA5124d4e6dff383ea085e7fbe0f8dcefa152f0705a4e68e3e9aba6e0b210fde0c4e99c65f5c54a85f35d9a80671362490e176cf764e0756eea2bdb1aa880b4804f8c