Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
0e565ef586e8276dd2409a740e024099.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e565ef586e8276dd2409a740e024099.exe
Resource
win10v2004-20231215-en
General
-
Target
0e565ef586e8276dd2409a740e024099.exe
-
Size
82KB
-
MD5
0e565ef586e8276dd2409a740e024099
-
SHA1
d6a1567d8d112fc2be7e916da966789935430bb8
-
SHA256
e38d1531995bc87e52aa74fca84ea4221a5abd88e3ebeef6f1a61658d1d251ce
-
SHA512
90c232659b0e81b3b3a61fd5cca8ecf0f7a370be9e91ba57de8b08c75e306cc2791ed27d207707538ab9c331c10dfa0a30d0eba2789531e844778d52ad36671c
-
SSDEEP
1536:M4sHS/44wlySEU4MbQOiIn77Lr2ZYOu+i/G7HQATdW8PZ8b3pao3MSpE7WlpOXnK:M4sy/lwlySEU7bQOiIn77Lr2aOuT/G7i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1240 0e565ef586e8276dd2409a740e024099.exe -
Executes dropped EXE 1 IoCs
pid Process 1240 0e565ef586e8276dd2409a740e024099.exe -
Loads dropped DLL 1 IoCs
pid Process 3068 0e565ef586e8276dd2409a740e024099.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3068 0e565ef586e8276dd2409a740e024099.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3068 0e565ef586e8276dd2409a740e024099.exe 1240 0e565ef586e8276dd2409a740e024099.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1240 3068 0e565ef586e8276dd2409a740e024099.exe 29 PID 3068 wrote to memory of 1240 3068 0e565ef586e8276dd2409a740e024099.exe 29 PID 3068 wrote to memory of 1240 3068 0e565ef586e8276dd2409a740e024099.exe 29 PID 3068 wrote to memory of 1240 3068 0e565ef586e8276dd2409a740e024099.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e565ef586e8276dd2409a740e024099.exe"C:\Users\Admin\AppData\Local\Temp\0e565ef586e8276dd2409a740e024099.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\0e565ef586e8276dd2409a740e024099.exeC:\Users\Admin\AppData\Local\Temp\0e565ef586e8276dd2409a740e024099.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1240
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5b29313d2b051dc3e4eed052a75c4c284
SHA12190a442ee6318017eb546481e1ddca05b192988
SHA2564e7e706548be43295dcaa3a74e0d40748f2c99a4659f30652cac8073ce8e1529
SHA51204c500d325d060ee6e1d83b011239a31ec3674afec703cc7c00f755b1cf736a22df6945e9909e49afdf73bd0f71577fa2db3b412c7210318ae6fc8e6be50416e