Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:47
Behavioral task
behavioral1
Sample
090546ade6c8ce24e9088a6c94d85870.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
090546ade6c8ce24e9088a6c94d85870.exe
Resource
win10v2004-20231215-en
General
-
Target
090546ade6c8ce24e9088a6c94d85870.exe
-
Size
1.3MB
-
MD5
090546ade6c8ce24e9088a6c94d85870
-
SHA1
22901cb3a6134b3218d769446e49b910cf061cae
-
SHA256
e7bb10729fe0462d1b521ed8efeac738aed367d38d5c2df7f30f41cbe3bd2596
-
SHA512
6865e33b0a6b3dbcd4fb32e1582ae3d02faaa00f843415011983d0245568cc7ba12c4cc1ed55c66f3118780f843f3670142caf7ed6a7adb3e708b9584fb2454a
-
SSDEEP
24576:ACEgTAGecr8ILPc5AEF8PYH6Gvz9DP2x1IVUuk8zAXHbrwHEWc:7AGrHo5AEF8rGvz9rS1IVUz8zAXBp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2772 090546ade6c8ce24e9088a6c94d85870.exe -
Executes dropped EXE 1 IoCs
pid Process 2772 090546ade6c8ce24e9088a6c94d85870.exe -
Loads dropped DLL 1 IoCs
pid Process 2400 090546ade6c8ce24e9088a6c94d85870.exe -
resource yara_rule behavioral1/memory/2400-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b000000012238-10.dat upx behavioral1/memory/2400-15-0x00000000034D0000-0x00000000039BF000-memory.dmp upx behavioral1/memory/2772-17-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2400 090546ade6c8ce24e9088a6c94d85870.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2400 090546ade6c8ce24e9088a6c94d85870.exe 2772 090546ade6c8ce24e9088a6c94d85870.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2772 2400 090546ade6c8ce24e9088a6c94d85870.exe 28 PID 2400 wrote to memory of 2772 2400 090546ade6c8ce24e9088a6c94d85870.exe 28 PID 2400 wrote to memory of 2772 2400 090546ade6c8ce24e9088a6c94d85870.exe 28 PID 2400 wrote to memory of 2772 2400 090546ade6c8ce24e9088a6c94d85870.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\090546ade6c8ce24e9088a6c94d85870.exe"C:\Users\Admin\AppData\Local\Temp\090546ade6c8ce24e9088a6c94d85870.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\090546ade6c8ce24e9088a6c94d85870.exeC:\Users\Admin\AppData\Local\Temp\090546ade6c8ce24e9088a6c94d85870.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2772
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5323ab63556c05214c508f67dc4b2024e
SHA1c2d373ca7b47dc98ca2c3177a46a30b2ab02e289
SHA2565dba3aac1e9f7713512a2fb1f2aad311304a08071628fe8fc33cd7ea41e4e60c
SHA5122ef4f60481b4cdd7ba5ff7c1ada6b9fc0285259d38b1886394d2aef6af2ad08161b26936ae627f390e8b12ddb907fb0e0378662225fe962243e5bb559c481e71