Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
12385b6c626b12cbef8699ec9b738dbd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12385b6c626b12cbef8699ec9b738dbd.exe
Resource
win10v2004-20231215-en
General
-
Target
12385b6c626b12cbef8699ec9b738dbd.exe
-
Size
82KB
-
MD5
12385b6c626b12cbef8699ec9b738dbd
-
SHA1
80836a51c90c0df8a1580f033f854a45f34816fc
-
SHA256
6a2ca68e719efcfad66d1654f5a0a887784c2b19b4d55e4819d3735f1078fb28
-
SHA512
62bcf614cbcbe41150124e13ea5c718d276474aff3731e51c36fb5b8bf9597aa079e5fce5b9c39c8e841df2065c175ea82b18d97601bcf8ed5094f6402f954d5
-
SSDEEP
1536:wNAXczlJUajHMc4IiZ0wBSaNlVNCKw4EiCXEbzxoOK8Ays1I8Od:bMB+5c490ALVNCKPbiGK8Ays17+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2088 12385b6c626b12cbef8699ec9b738dbd.exe -
Executes dropped EXE 1 IoCs
pid Process 2088 12385b6c626b12cbef8699ec9b738dbd.exe -
Loads dropped DLL 1 IoCs
pid Process 1436 12385b6c626b12cbef8699ec9b738dbd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1436 12385b6c626b12cbef8699ec9b738dbd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1436 12385b6c626b12cbef8699ec9b738dbd.exe 2088 12385b6c626b12cbef8699ec9b738dbd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1436 wrote to memory of 2088 1436 12385b6c626b12cbef8699ec9b738dbd.exe 29 PID 1436 wrote to memory of 2088 1436 12385b6c626b12cbef8699ec9b738dbd.exe 29 PID 1436 wrote to memory of 2088 1436 12385b6c626b12cbef8699ec9b738dbd.exe 29 PID 1436 wrote to memory of 2088 1436 12385b6c626b12cbef8699ec9b738dbd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\12385b6c626b12cbef8699ec9b738dbd.exe"C:\Users\Admin\AppData\Local\Temp\12385b6c626b12cbef8699ec9b738dbd.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\12385b6c626b12cbef8699ec9b738dbd.exeC:\Users\Admin\AppData\Local\Temp\12385b6c626b12cbef8699ec9b738dbd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2088
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD567fcd461d7eaaf7d48fce79b6a28ec1d
SHA1a14af9e9c5545b2a41e4f7a2884c7405bd5ca683
SHA256b55f0e45891d841e58ab31aabc3517911d3cc2e39705780d1441844462303c23
SHA512ad0cff921dc11e97091ad0431b4b8b3edbb274163de6c684f60ea8e29899ed8991b761e8e552f27564e28b4b00421c8ea8eb281b20676565b51c5e198bf28518