Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
0c02b9d0bc298cd6aaf12e1162b26777.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c02b9d0bc298cd6aaf12e1162b26777.exe
Resource
win10v2004-20231215-en
General
-
Target
0c02b9d0bc298cd6aaf12e1162b26777.exe
-
Size
82KB
-
MD5
0c02b9d0bc298cd6aaf12e1162b26777
-
SHA1
50bb47d2a5f53b1b6c6a67acff6460cb63e11c79
-
SHA256
5749dc84a88afddc221672319f13eb3730c4ab4b1e1223fb191296d999956380
-
SHA512
aa567c6fa32a5e013e8bee1ba643d8897763f304216f7c915de0ffc27c823607f4522be23ae9dbd00e60e03f566fe304ba1281e9ed419e1db4fce097940450c2
-
SSDEEP
1536:onaxJDTGqU18SAXXef/DbKBTm0VffNLAg4ZV6goG3FOW32mjR/Cq0jpWQxAeMeV3:onKDNTSOX/BTV1NLAgA4AFOW3DdK86MY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2988 0c02b9d0bc298cd6aaf12e1162b26777.exe -
Executes dropped EXE 1 IoCs
pid Process 2988 0c02b9d0bc298cd6aaf12e1162b26777.exe -
Loads dropped DLL 1 IoCs
pid Process 2532 0c02b9d0bc298cd6aaf12e1162b26777.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2532 0c02b9d0bc298cd6aaf12e1162b26777.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2532 0c02b9d0bc298cd6aaf12e1162b26777.exe 2988 0c02b9d0bc298cd6aaf12e1162b26777.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2988 2532 0c02b9d0bc298cd6aaf12e1162b26777.exe 29 PID 2532 wrote to memory of 2988 2532 0c02b9d0bc298cd6aaf12e1162b26777.exe 29 PID 2532 wrote to memory of 2988 2532 0c02b9d0bc298cd6aaf12e1162b26777.exe 29 PID 2532 wrote to memory of 2988 2532 0c02b9d0bc298cd6aaf12e1162b26777.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c02b9d0bc298cd6aaf12e1162b26777.exe"C:\Users\Admin\AppData\Local\Temp\0c02b9d0bc298cd6aaf12e1162b26777.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\0c02b9d0bc298cd6aaf12e1162b26777.exeC:\Users\Admin\AppData\Local\Temp\0c02b9d0bc298cd6aaf12e1162b26777.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2988
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5d8e039129784cdd3f3bd4ecab98a8f4c
SHA16f7d19878b43a94d843758929608f2873ad3c7d6
SHA256488dd2a1213d38f03aaa4b1b105d63606b4f09142409a66f0797138a07114385
SHA51201a641ad9457c28b043e9cf0c6567d20448f38ad9c835061f5f3b31f33cae7415eb8e42ef85452ffae9fedfd96572e5f2a441eb734027aa577ff379db369d37a