Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:37
Behavioral task
behavioral1
Sample
20417d89dc8a27dd8d0e8ec1e37f97ba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20417d89dc8a27dd8d0e8ec1e37f97ba.exe
Resource
win10v2004-20231215-en
General
-
Target
20417d89dc8a27dd8d0e8ec1e37f97ba.exe
-
Size
2.9MB
-
MD5
20417d89dc8a27dd8d0e8ec1e37f97ba
-
SHA1
fbbcd346226ec30c2390eeb4519a2de46a95e613
-
SHA256
741fdc14daeefd9bb35c53bb17bcc5145622dd27e3bdf9fde97639ae66b0d5c5
-
SHA512
fced2fd71b973d973c0156638182532b18b5c829c4b966f222ab10daf3c330053a77df495205700772340d1fbf6426dd78bdb8ce394ae04d0f70e05e7d0f12cf
-
SSDEEP
49152:xnguqq8Uxfz2kjojtdFeTxKTXiN74NH5HUyNRcUsCVOzetdZJ:xgtoxfzV6FeNKji4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 20417d89dc8a27dd8d0e8ec1e37f97ba.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 20417d89dc8a27dd8d0e8ec1e37f97ba.exe -
Loads dropped DLL 1 IoCs
pid Process 1352 20417d89dc8a27dd8d0e8ec1e37f97ba.exe -
resource yara_rule behavioral1/memory/1352-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x0007000000012284-10.dat upx behavioral1/files/0x0007000000012284-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1352 20417d89dc8a27dd8d0e8ec1e37f97ba.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1352 20417d89dc8a27dd8d0e8ec1e37f97ba.exe 2692 20417d89dc8a27dd8d0e8ec1e37f97ba.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1352 wrote to memory of 2692 1352 20417d89dc8a27dd8d0e8ec1e37f97ba.exe 28 PID 1352 wrote to memory of 2692 1352 20417d89dc8a27dd8d0e8ec1e37f97ba.exe 28 PID 1352 wrote to memory of 2692 1352 20417d89dc8a27dd8d0e8ec1e37f97ba.exe 28 PID 1352 wrote to memory of 2692 1352 20417d89dc8a27dd8d0e8ec1e37f97ba.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\20417d89dc8a27dd8d0e8ec1e37f97ba.exe"C:\Users\Admin\AppData\Local\Temp\20417d89dc8a27dd8d0e8ec1e37f97ba.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\20417d89dc8a27dd8d0e8ec1e37f97ba.exeC:\Users\Admin\AppData\Local\Temp\20417d89dc8a27dd8d0e8ec1e37f97ba.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2692
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
410KB
MD573c2e9e7ac53e0e39535f7b3bba0c962
SHA1a20320ec2e6946cd1914b4e9a5186a10fac9abdf
SHA256d30845ac8ab79afaab95b8491b96e774a464bddf353351c4589ab6f835817726
SHA512f6fbb2e4ba7692c253578d41e1057a5163cb1ecb96b55e04f18adb737580393685daeb5c46100e0673dc20bfbcfb0ced5c9508debbfd3e77e0e188ce751df38d
-
Filesize
446KB
MD552b8dcabc5e61dbd9ebe9ad5b10e18b6
SHA1b572fca853d33dc5a9581390295089ad6f53d690
SHA25616429b5d9fd48cf3928ee3fe8ddd78948f276a6fb881b6e94ac58fb0dc70cd58
SHA51271794c4095337b1e37ad7806e84779c8e0913114a45ef39bd4a1484ab2b6408d1e29fa4c8cdaa4653f282154fd8ed1b79efff18f7a62797cf9a5cc15d6d6d1be