Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:12
Behavioral task
behavioral1
Sample
0e059d8f4b289782462a62a2934dd40f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e059d8f4b289782462a62a2934dd40f.exe
Resource
win10v2004-20231215-en
General
-
Target
0e059d8f4b289782462a62a2934dd40f.exe
-
Size
1.3MB
-
MD5
0e059d8f4b289782462a62a2934dd40f
-
SHA1
6acb92e1859af59c8ae51d591babed9959339009
-
SHA256
f620023ce9f5c1e11025c082605b74d2002097b7066b74078c197bed3f2aa844
-
SHA512
03311c5e56cddc4e75429a9560a4e433e06019b7056c3601bf2b56c9ac8029766b12fd0afbf6309940fc92bc4a2b0b68d867bfcdbd82f02a01ba954d9741396d
-
SSDEEP
24576:WTTp81+wq0ovizGhDw+Pi0GRMbEyNnZOFUi4kid6iYU9/9Us:WTTp81+wq0Dd0GRMbE02P4ldtHR9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2788 0e059d8f4b289782462a62a2934dd40f.exe -
Executes dropped EXE 1 IoCs
pid Process 2788 0e059d8f4b289782462a62a2934dd40f.exe -
Loads dropped DLL 1 IoCs
pid Process 2548 0e059d8f4b289782462a62a2934dd40f.exe -
resource yara_rule behavioral1/memory/2548-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x0009000000012252-10.dat upx behavioral1/files/0x0009000000012252-14.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2548 0e059d8f4b289782462a62a2934dd40f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2548 0e059d8f4b289782462a62a2934dd40f.exe 2788 0e059d8f4b289782462a62a2934dd40f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2788 2548 0e059d8f4b289782462a62a2934dd40f.exe 28 PID 2548 wrote to memory of 2788 2548 0e059d8f4b289782462a62a2934dd40f.exe 28 PID 2548 wrote to memory of 2788 2548 0e059d8f4b289782462a62a2934dd40f.exe 28 PID 2548 wrote to memory of 2788 2548 0e059d8f4b289782462a62a2934dd40f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e059d8f4b289782462a62a2934dd40f.exe"C:\Users\Admin\AppData\Local\Temp\0e059d8f4b289782462a62a2934dd40f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\0e059d8f4b289782462a62a2934dd40f.exeC:\Users\Admin\AppData\Local\Temp\0e059d8f4b289782462a62a2934dd40f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2788
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5166fe1ec7d714fbb0bb36b2651491464
SHA118426544ab67006f9f2895f0dc92408bd153b0f9
SHA256b80a131e2790e4dfaf94e48cbf0388dc90f79808f812b2f4707413c9ba0c6ca0
SHA512d18eb7f2e7cfbd8fc1b7159a204d3f15e213637c5fb0cf1193b0f0996b2f3404c68fe265c1a563e0c9e542bc151aa58244082aaed9e12b329d456383bd30e823
-
Filesize
1.1MB
MD58f00a8b26a26e7ef734d17ba56489177
SHA1645a4eacae7de0ee7a2135fe922cc8f0c5a013b3
SHA256e1381240f60512c9fde8f819ed1f76f3b194fcb033dbd7c740ac7ff7cb7e9143
SHA512319ad5aa18532a6a001aac4c1aa1bdddf10efd0a7a8240cb8060e0f0ece07c259a0aa8ea31b6ccab1147942b85416aae8c00ac5da45365b46ad88ddd6410a265