Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:37
Behavioral task
behavioral1
Sample
1eafce42fe6cd6b4c7e091432e8f287c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1eafce42fe6cd6b4c7e091432e8f287c.exe
Resource
win10v2004-20231215-en
General
-
Target
1eafce42fe6cd6b4c7e091432e8f287c.exe
-
Size
1.3MB
-
MD5
1eafce42fe6cd6b4c7e091432e8f287c
-
SHA1
a26206595b4746beed0dff1220355ca3e11100d6
-
SHA256
84807a64117e1f5ed93a6f41f16db800bf3d146037d05926f8b999d473c2256e
-
SHA512
da3fc9fd492db8c6e153053568fcb9fb33db18f041ed255aa8c5cb25e20a4cfa57441a57d073d18162fd444b86084ab78fb434b12ab45d129a6bb535612b3119
-
SSDEEP
24576:YgbCTJNYQizjTEUgnt/vVyR0a9KjfleUTIbdS9fh18JvG:YgbCTb/wjpA/vVyaaEfUGI5S9fg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3060 1eafce42fe6cd6b4c7e091432e8f287c.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 1eafce42fe6cd6b4c7e091432e8f287c.exe -
Loads dropped DLL 1 IoCs
pid Process 2024 1eafce42fe6cd6b4c7e091432e8f287c.exe -
resource yara_rule behavioral1/memory/3060-18-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000c0000000122bb-14.dat upx behavioral1/files/0x000c0000000122bb-11.dat upx behavioral1/memory/2024-0-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2024 1eafce42fe6cd6b4c7e091432e8f287c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2024 1eafce42fe6cd6b4c7e091432e8f287c.exe 3060 1eafce42fe6cd6b4c7e091432e8f287c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 3060 2024 1eafce42fe6cd6b4c7e091432e8f287c.exe 15 PID 2024 wrote to memory of 3060 2024 1eafce42fe6cd6b4c7e091432e8f287c.exe 15 PID 2024 wrote to memory of 3060 2024 1eafce42fe6cd6b4c7e091432e8f287c.exe 15 PID 2024 wrote to memory of 3060 2024 1eafce42fe6cd6b4c7e091432e8f287c.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eafce42fe6cd6b4c7e091432e8f287c.exe"C:\Users\Admin\AppData\Local\Temp\1eafce42fe6cd6b4c7e091432e8f287c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\1eafce42fe6cd6b4c7e091432e8f287c.exeC:\Users\Admin\AppData\Local\Temp\1eafce42fe6cd6b4c7e091432e8f287c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3060
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD590ce09758f4819684b455bcd3c4d5f1c
SHA1d2cda5bb57b84334821517e7feaf2df71e01838f
SHA256fb7d82e2a5cb68ca670809f2aa7dfd557c0a584363b31a5bdcb2925a18859117
SHA5123547328450ae3a9d1d80322ae461b94b8f9657985397c9b096dc954674b2abf1f9b739bda4c2cea9ac49e997d1343e7b222e214e12fb5427122be1fea11d9fc7