Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
5s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:02
Behavioral task
behavioral1
Sample
0b03d643132de0247bcf52ddf89b1543.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
0b03d643132de0247bcf52ddf89b1543.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
0b03d643132de0247bcf52ddf89b1543.exe
-
Size
302KB
-
MD5
0b03d643132de0247bcf52ddf89b1543
-
SHA1
e37bfbafe52ab5e73e6353c2ff4d04b28f6f8900
-
SHA256
437e4841f70ebeb3a3503f3bb3178dcf159704c53bf758e8a14316cc376eb072
-
SHA512
ed7dc80c7726537ede0865a6d254d037338c7f2bc8cb83fe6a4501be25a59faa1205b0bafbc774e914a67aa42ad8b68250e93d49430ecbfcf2270d998e4461f5
-
SSDEEP
6144:dXE7+kUOL3enrCgjpHfyNJKYw+3jzp3V9u3VXH0mQ:GxUOL3lg9fyTBw4jt20m
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1128 0b03d643132de0247bcf52ddf89b1543.exe -
Executes dropped EXE 1 IoCs
pid Process 1128 0b03d643132de0247bcf52ddf89b1543.exe -
Loads dropped DLL 1 IoCs
pid Process 1336 0b03d643132de0247bcf52ddf89b1543.exe -
resource yara_rule behavioral1/memory/1336-0-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/1336-16-0x00000000014E0000-0x00000000015C0000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1336 0b03d643132de0247bcf52ddf89b1543.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1336 0b03d643132de0247bcf52ddf89b1543.exe 1128 0b03d643132de0247bcf52ddf89b1543.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1128 1336 0b03d643132de0247bcf52ddf89b1543.exe 16 PID 1336 wrote to memory of 1128 1336 0b03d643132de0247bcf52ddf89b1543.exe 16 PID 1336 wrote to memory of 1128 1336 0b03d643132de0247bcf52ddf89b1543.exe 16 PID 1336 wrote to memory of 1128 1336 0b03d643132de0247bcf52ddf89b1543.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b03d643132de0247bcf52ddf89b1543.exe"C:\Users\Admin\AppData\Local\Temp\0b03d643132de0247bcf52ddf89b1543.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\0b03d643132de0247bcf52ddf89b1543.exeC:\Users\Admin\AppData\Local\Temp\0b03d643132de0247bcf52ddf89b1543.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1128
-