Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 06:47
Behavioral task
behavioral1
Sample
116b72cec9132c965958d07bb62ad1ba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
116b72cec9132c965958d07bb62ad1ba.exe
Resource
win10v2004-20231215-en
General
-
Target
116b72cec9132c965958d07bb62ad1ba.exe
-
Size
2.4MB
-
MD5
116b72cec9132c965958d07bb62ad1ba
-
SHA1
05186fbf693f0053d4a014febfaf2d369434b316
-
SHA256
5e7389ef4f7952e213f2d8ef8fba4ea9fd07c1ac6d26b5e1a72a57b403306055
-
SHA512
1a6464cfdf39a724389df3663b2f91f2ec3bc5bfa47c7b8491a5fb1b3f000ba4b5a7c54efb0be22b68fcca7e639d1d039932dc35fc9a4ac18577cd55ac58514e
-
SSDEEP
49152:PrRa2gnrFE2/wGv7icNvXqO1IMoP4M338dB2IBlGuuDVUsdxxjr:daVnrFE2vjiO8Pgg3gnl/IVUs1jr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2984 116b72cec9132c965958d07bb62ad1ba.exe -
Executes dropped EXE 1 IoCs
pid Process 2984 116b72cec9132c965958d07bb62ad1ba.exe -
Loads dropped DLL 1 IoCs
pid Process 2612 116b72cec9132c965958d07bb62ad1ba.exe -
resource yara_rule behavioral1/memory/2612-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000c000000012261-10.dat upx behavioral1/files/0x000c000000012261-14.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2612 116b72cec9132c965958d07bb62ad1ba.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2612 116b72cec9132c965958d07bb62ad1ba.exe 2984 116b72cec9132c965958d07bb62ad1ba.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2984 2612 116b72cec9132c965958d07bb62ad1ba.exe 19 PID 2612 wrote to memory of 2984 2612 116b72cec9132c965958d07bb62ad1ba.exe 19 PID 2612 wrote to memory of 2984 2612 116b72cec9132c965958d07bb62ad1ba.exe 19 PID 2612 wrote to memory of 2984 2612 116b72cec9132c965958d07bb62ad1ba.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\116b72cec9132c965958d07bb62ad1ba.exe"C:\Users\Admin\AppData\Local\Temp\116b72cec9132c965958d07bb62ad1ba.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\116b72cec9132c965958d07bb62ad1ba.exeC:\Users\Admin\AppData\Local\Temp\116b72cec9132c965958d07bb62ad1ba.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2984
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD5c255c8eeed7791cf7bc996034e34ce35
SHA1906d4636dea872e56d13345fc7c875f6c327ed8e
SHA25644ba56355cd2e403a6264a6f815687dcf7e287fdcf5e148c046460d1bf77682c
SHA512e8ecf4aa9debcb4448e41fd26c8375a307b5ae224eadc851e2c7f1f855a0efc01d5f2440d3fd617bdc640474f612f9f34f4098a40f9e2478d3b043fb8aad80ed
-
Filesize
109KB
MD50fa7c513f07d2b41d32d4774f0cd94d3
SHA1b90c89e23ef021191937362f6ce064eb66bec148
SHA25671abbd4fb89f05c7060d16807ca01d9ae05de067058f561ecaee6df6bbf9f600
SHA51224a8f0f65f3626c579fcec8f8469f4ed6378ba8623a49e0a20d6f4a727b16f36262ad42b7a5290702f50e25ec32133c6dd45dd9219069d6615db8e26b48e66f2