Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe
Resource
win10v2004-20231215-en
General
-
Target
23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe
-
Size
907KB
-
MD5
23f81c8bdd9aa3e22c34c9f17dc0fb4d
-
SHA1
2ee7d7926a25cace8ff18dd3ec864f515b687dcb
-
SHA256
1c8342823cc380cba32495dd6056f9cdc4fd4461902ee295d378be80a2212ea3
-
SHA512
8e1a1b88fe4411d15833175f592d95fb4d89d06b1624abe2c4d43d830be9810cc0cbcfa0707989850cce1eb7c9400d42b1b05ed4ab9c2e15dac7d3790779f617
-
SSDEEP
12288:vXnIub7x3LWyFmGJL6WuPYSozWgEec+oXupYLgkG7rft1sCJvWIC7ZB5jVDa/ZS1:vXn9pWyFmGVLAGnb9zZJvWIUZB/a/ZS1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2764 23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe -
Executes dropped EXE 1 IoCs
pid Process 2764 23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe -
Loads dropped DLL 1 IoCs
pid Process 2324 23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2324 23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2324 23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe 2764 23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2764 2324 23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe 14 PID 2324 wrote to memory of 2764 2324 23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe 14 PID 2324 wrote to memory of 2764 2324 23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe 14 PID 2324 wrote to memory of 2764 2324 23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\23f81c8bdd9aa3e22c34c9f17dc0fb4d.exeC:\Users\Admin\AppData\Local\Temp\23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2764
-
C:\Users\Admin\AppData\Local\Temp\23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe"C:\Users\Admin\AppData\Local\Temp\23f81c8bdd9aa3e22c34c9f17dc0fb4d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD584a4974c2d22f28abf6e058f8485b9f9
SHA1397635c06953c1b55290922481c9af07a95a45ab
SHA256baa03ff90c1c45a132de3de72c8352e1b5eee5bf17bd47f2b42dc460d7225d05
SHA5126545b960ee236c9ff8378052a673b90a38e596eb5a954900022b2b2d6a36593f927b3662135e480069fd5646eab23849bcd035bdd7882ee3e85cacc1be2416df