Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
1dfc5a4ef362def6e56ae0dd75ae617b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1dfc5a4ef362def6e56ae0dd75ae617b.exe
Resource
win10v2004-20231215-en
General
-
Target
1dfc5a4ef362def6e56ae0dd75ae617b.exe
-
Size
1.9MB
-
MD5
1dfc5a4ef362def6e56ae0dd75ae617b
-
SHA1
65319d0ad8054878b0e126735a28424214f7246a
-
SHA256
1849d5e2c31ede164c3e6d10d85fdfbee1c617cca03bdc111d2c557d8c003463
-
SHA512
c82cd76eadb837ccc76422e2b13f61737cf9b22262571e427e05afb50426b132f10e14e5768fd8c9a1687cab3d2d95f070b47c8ffc612b2236ebd74633f1f145
-
SSDEEP
49152:Qoa1taC070d4Q0dY77232Ijt3TSJMNb4lqNXdAFp3D:Qoa1taC03QX72NZTSywYXsD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1964 1D22.tmp -
Executes dropped EXE 1 IoCs
pid Process 1964 1D22.tmp -
Loads dropped DLL 1 IoCs
pid Process 2224 1dfc5a4ef362def6e56ae0dd75ae617b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1964 2224 1dfc5a4ef362def6e56ae0dd75ae617b.exe 28 PID 2224 wrote to memory of 1964 2224 1dfc5a4ef362def6e56ae0dd75ae617b.exe 28 PID 2224 wrote to memory of 1964 2224 1dfc5a4ef362def6e56ae0dd75ae617b.exe 28 PID 2224 wrote to memory of 1964 2224 1dfc5a4ef362def6e56ae0dd75ae617b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dfc5a4ef362def6e56ae0dd75ae617b.exe"C:\Users\Admin\AppData\Local\Temp\1dfc5a4ef362def6e56ae0dd75ae617b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\1D22.tmp"C:\Users\Admin\AppData\Local\Temp\1D22.tmp" --splashC:\Users\Admin\AppData\Local\Temp\1dfc5a4ef362def6e56ae0dd75ae617b.exe D783E785B7B6B7CC7EEA1B9354AAB7F14B26F2B35CDDDD3599376DFC92322EA8B17CE5B4008BF2F1EC387F98EB21C5754D8402B1A25D19754BA1787A64F62D482⤵
- Deletes itself
- Executes dropped EXE
PID:1964
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5f5e33918d4109b01ec7417f25a4d7819
SHA1aed3726b9b4219e7e9a8be7beff0ea3958b953c5
SHA25683b67aaa666dbea9e6f1917df16aa641792db2d1c9a849e25a25b2bf744fba03
SHA512891b5254182ea939af8bb452d38a72742d356262138a7a5aec12244d0e111d073d568c520b81ad19b27a1402135f6968f1e84c51cdc73dc8b3c5adb2d06789f3
-
Filesize
896KB
MD594d25a7268c4f9e0b9be7dd05f977e27
SHA140ca23812cbb21b4333ed38dcc307c04ff7371d4
SHA256f939d3367de90a3f1dfa63e9f83f2ceb0e8b062ea5ceda795b37ecce4687e6e3
SHA512d41c1dab95456ce6f99b54ae46e889a9547614381d2d86560343c260c2b33b0c1474425b271d97e4fc9cee1cfdcd4d4e95ae7a8d41679ee9370621b4e819e99d