Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:12
Static task
static1
Behavioral task
behavioral1
Sample
1e15dff6f4219f6fe1e9e037e3423310.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e15dff6f4219f6fe1e9e037e3423310.exe
Resource
win10v2004-20231222-en
General
-
Target
1e15dff6f4219f6fe1e9e037e3423310.exe
-
Size
82KB
-
MD5
1e15dff6f4219f6fe1e9e037e3423310
-
SHA1
969cf4f3a0ceb8b593bbb5b66d382797e8ab4802
-
SHA256
d3c67935a09c9e889f2f4b4dda4aa0fc55bfd20595446ad6d927e3b06cde1e84
-
SHA512
af92fa5458044efccc5ab0e139ef00c6fddcee161538d2a9d1e65592c45a9f281e8e48dc1fb866be3b4396bf74967c9101342eca1a8b0aecc11fc7d2fc116d99
-
SSDEEP
1536:6pT3IXW+o+7B44eE/Hv/+alWI9892D5XjKxZhEFqWrfCh316y9+UvB0pfC:k3n+hOJEmD+5XGmmhfKpfC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2496 1e15dff6f4219f6fe1e9e037e3423310.exe -
Executes dropped EXE 1 IoCs
pid Process 2496 1e15dff6f4219f6fe1e9e037e3423310.exe -
Loads dropped DLL 1 IoCs
pid Process 1700 1e15dff6f4219f6fe1e9e037e3423310.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1700 1e15dff6f4219f6fe1e9e037e3423310.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1700 1e15dff6f4219f6fe1e9e037e3423310.exe 2496 1e15dff6f4219f6fe1e9e037e3423310.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2496 1700 1e15dff6f4219f6fe1e9e037e3423310.exe 18 PID 1700 wrote to memory of 2496 1700 1e15dff6f4219f6fe1e9e037e3423310.exe 18 PID 1700 wrote to memory of 2496 1700 1e15dff6f4219f6fe1e9e037e3423310.exe 18 PID 1700 wrote to memory of 2496 1700 1e15dff6f4219f6fe1e9e037e3423310.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e15dff6f4219f6fe1e9e037e3423310.exe"C:\Users\Admin\AppData\Local\Temp\1e15dff6f4219f6fe1e9e037e3423310.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\1e15dff6f4219f6fe1e9e037e3423310.exeC:\Users\Admin\AppData\Local\Temp\1e15dff6f4219f6fe1e9e037e3423310.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2496
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e311df53e375556075773d1667b15c0f
SHA179e78ab7b66abce36321c74c03c82b344d22c045
SHA25650c3072c03080fc8b22545ba679ea1c38afdd369e9d2e944283bb3e67338a3d9
SHA512f5ca27b573dab49fa9b8f2e0124fc1daa0bc05add463c30d891209661bcb130b1b6aeccf3daa28a89105817875764ca40027fa0d5635003fc9b240cc946be9f2
-
Filesize
60KB
MD51b02cb729a4fb5b1670a9d865dfbbdf2
SHA147d2ac6a147208ddcb9f2d559001ff330a1bb59c
SHA256c11254699093bb064c21add9491cb0a92b08f501aa5aadb3025fcb86447b5e92
SHA51239627e445334fc6384ba6c2267ca73e1083f2810efbc98a20ab585c2b6b9555f275a037bc83ec02278432cec7bdb3d16f4c01808aea26df3ece2a643ec6b96bb