Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
273s -
max time network
316s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 09:42
Behavioral task
behavioral1
Sample
14cbedbb2439c3e7f15a7231cf96e46b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14cbedbb2439c3e7f15a7231cf96e46b.exe
Resource
win10v2004-20231215-en
General
-
Target
14cbedbb2439c3e7f15a7231cf96e46b.exe
-
Size
302KB
-
MD5
14cbedbb2439c3e7f15a7231cf96e46b
-
SHA1
3a487cbd9bf8b4f2e9be0a752204a86592870216
-
SHA256
171ed7546c601fc6d0ee8ae44bbdb5e4bdfd9cea1339cc818535d596227c71a4
-
SHA512
78e5fb29a7dd97f9827f4177cbf7c33541c158f1781f8060c7c0d24d9116cd39953d4d9ae848a9fbaf54c4c47e857cd7ef93ce152e1b66571c628fd9315616c0
-
SSDEEP
6144:CD+4Bwu1tGYzU5ratRC5dYdIc/nmfOMyqFBB9mQ:EbH1kSU5rWRAYb/nmfyU9m
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 680 14cbedbb2439c3e7f15a7231cf96e46b.exe -
Executes dropped EXE 1 IoCs
pid Process 680 14cbedbb2439c3e7f15a7231cf96e46b.exe -
Loads dropped DLL 1 IoCs
pid Process 1052 14cbedbb2439c3e7f15a7231cf96e46b.exe -
resource yara_rule behavioral1/memory/1052-0-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/files/0x0004000000004ed7-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1052 14cbedbb2439c3e7f15a7231cf96e46b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1052 14cbedbb2439c3e7f15a7231cf96e46b.exe 680 14cbedbb2439c3e7f15a7231cf96e46b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1052 wrote to memory of 680 1052 14cbedbb2439c3e7f15a7231cf96e46b.exe 28 PID 1052 wrote to memory of 680 1052 14cbedbb2439c3e7f15a7231cf96e46b.exe 28 PID 1052 wrote to memory of 680 1052 14cbedbb2439c3e7f15a7231cf96e46b.exe 28 PID 1052 wrote to memory of 680 1052 14cbedbb2439c3e7f15a7231cf96e46b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\14cbedbb2439c3e7f15a7231cf96e46b.exe"C:\Users\Admin\AppData\Local\Temp\14cbedbb2439c3e7f15a7231cf96e46b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\14cbedbb2439c3e7f15a7231cf96e46b.exeC:\Users\Admin\AppData\Local\Temp\14cbedbb2439c3e7f15a7231cf96e46b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:680
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302KB
MD5408a98566b9c05365eaf11952fdaee45
SHA1a888ac12d322f58528fd424a54b6f450cc5ba69b
SHA256b443349d897c4aa9a58816892cbf3e981d7d7765f3feffd280a90f8565db2a26
SHA512d6bc6c3fca696dfa4b569207e5190306e5d88619878f1f297ad104baec9141e3bb2384a3be9c6e8b90c080668727232648d08b89859158bb21ba40a9a9eedd58