Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
17b68a0f34217caa05c8f78d44a21291.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17b68a0f34217caa05c8f78d44a21291.exe
Resource
win10v2004-20231215-en
General
-
Target
17b68a0f34217caa05c8f78d44a21291.exe
-
Size
82KB
-
MD5
17b68a0f34217caa05c8f78d44a21291
-
SHA1
010e5f9b4ff8cc9c9be18d9354a403dafa646578
-
SHA256
3832b679932e2c26c289ae62ff5f0db97022e6ed2067a43e62e3e6e3d155a52b
-
SHA512
e3b5613d34229dce20cf9fb9f9f2ccee25667ffa51c0b223138d32a2ddadc06cae09f113ea71dd17dd026aafd020480571758bd78a2c72feaa1878dee6e014fb
-
SSDEEP
1536:y0QHkW+wLPQJUxvt6EY1ymPysEU3HUjsj2GghbntXB4R:yn0CjtMEY8Zs3ZjWwR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2376 17b68a0f34217caa05c8f78d44a21291.exe -
Executes dropped EXE 1 IoCs
pid Process 2376 17b68a0f34217caa05c8f78d44a21291.exe -
Loads dropped DLL 1 IoCs
pid Process 2220 17b68a0f34217caa05c8f78d44a21291.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2220 17b68a0f34217caa05c8f78d44a21291.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2220 17b68a0f34217caa05c8f78d44a21291.exe 2376 17b68a0f34217caa05c8f78d44a21291.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2376 2220 17b68a0f34217caa05c8f78d44a21291.exe 29 PID 2220 wrote to memory of 2376 2220 17b68a0f34217caa05c8f78d44a21291.exe 29 PID 2220 wrote to memory of 2376 2220 17b68a0f34217caa05c8f78d44a21291.exe 29 PID 2220 wrote to memory of 2376 2220 17b68a0f34217caa05c8f78d44a21291.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\17b68a0f34217caa05c8f78d44a21291.exe"C:\Users\Admin\AppData\Local\Temp\17b68a0f34217caa05c8f78d44a21291.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\17b68a0f34217caa05c8f78d44a21291.exeC:\Users\Admin\AppData\Local\Temp\17b68a0f34217caa05c8f78d44a21291.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2376
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD52ff7683eab172cad17106af7fb038827
SHA136bb3625d476e329799041689dc73e35cdf64576
SHA256f3919e7bb72c467d637d2e527291db23fc51697af74b34f5e33f7f9ecb2d07eb
SHA512f883f5bb3e94b44512eef31151fb094b810b98a16e57e9eb826fc8b7da1ad394c986415727ac3b787b66e64253236e3378e0c810b201b70a8b573053d5c7ce0f