Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:15
Behavioral task
behavioral1
Sample
132ad66647754c6872e2bd0717f13d4b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
132ad66647754c6872e2bd0717f13d4b.exe
Resource
win10v2004-20231215-en
General
-
Target
132ad66647754c6872e2bd0717f13d4b.exe
-
Size
5.3MB
-
MD5
132ad66647754c6872e2bd0717f13d4b
-
SHA1
6f4620960eef2e06d4d242fe2aa6edd67265572e
-
SHA256
fd54c3ba5f46872afdf36334bc2c7a7dfc4d1aa97ade40f3def8f5b6fecefc8f
-
SHA512
ba520424d3be3879c717a9af93e870ea4fed4baebbc44e6df17f2faeb2fb40b929b0700e2185868fae3b3b4809da8c32727e2472a68bab14c7bd80c42ed17824
-
SSDEEP
98304:34YwhwgQ5oHbYpbuyptQxgCHC+c6dHXQaQflcB9I+MAhVeZuHbYpbuyptQxgCHCs:3OAXtQxgCHG2Aza7h4QAXtQxgCHG2D
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3004 132ad66647754c6872e2bd0717f13d4b.exe -
Executes dropped EXE 1 IoCs
pid Process 3004 132ad66647754c6872e2bd0717f13d4b.exe -
Loads dropped DLL 1 IoCs
pid Process 1696 132ad66647754c6872e2bd0717f13d4b.exe -
resource yara_rule behavioral1/memory/1696-1-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x000800000000b529-13.dat upx behavioral1/files/0x000800000000b529-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1696 132ad66647754c6872e2bd0717f13d4b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1696 132ad66647754c6872e2bd0717f13d4b.exe 3004 132ad66647754c6872e2bd0717f13d4b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 3004 1696 132ad66647754c6872e2bd0717f13d4b.exe 28 PID 1696 wrote to memory of 3004 1696 132ad66647754c6872e2bd0717f13d4b.exe 28 PID 1696 wrote to memory of 3004 1696 132ad66647754c6872e2bd0717f13d4b.exe 28 PID 1696 wrote to memory of 3004 1696 132ad66647754c6872e2bd0717f13d4b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\132ad66647754c6872e2bd0717f13d4b.exe"C:\Users\Admin\AppData\Local\Temp\132ad66647754c6872e2bd0717f13d4b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\132ad66647754c6872e2bd0717f13d4b.exeC:\Users\Admin\AppData\Local\Temp\132ad66647754c6872e2bd0717f13d4b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3004
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
894KB
MD5bb999144c6d7a407ef60fa975302a3f6
SHA12e8699d781903466b96605936374d5d4229142d2
SHA256be5ccdfcd227a065b3562882a1c2d2e07db7c68152e1b5b9a8a26b2e89a86550
SHA512c0d16a7b68fb83762ad82d355e898a8b937519221b33a78653f24bb399856259819d2fe8a930d4969cee10c2a62692e2bf8b73821bee7bb2c2b905d1dd132589
-
Filesize
1.1MB
MD515c2af4ed54d8fd9e8a003214f25069f
SHA121a917f14be212b0c1963df433bb0947be68cc3a
SHA2563673f424cc4e9f7a517be756cc1ac9ce88227744e3de4ad9248525fa3865232b
SHA512efcf53fa1e6b208800bd5e901396b38935934594c0ed09ce9bac9e86faba5f4d5a98659b951fcbd547bc67f09d7c8535843213192bc91080692159f1414cf0d3