Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
26bc36dc9039de37d753d3e6f84c6b63.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
26bc36dc9039de37d753d3e6f84c6b63.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
26bc36dc9039de37d753d3e6f84c6b63.exe
-
Size
57KB
-
MD5
26bc36dc9039de37d753d3e6f84c6b63
-
SHA1
89ac6cbb78d60be5bd8e4c50b90015463209037f
-
SHA256
3fb3783cacd5d34764cfed6d20179f46e3eff2bd1c2e64cb31c77741a359fac9
-
SHA512
2f18882bb0e1ea3655cbcbb0402c2a96043b7fcdd01509fd461cfc0ee8cdc21ef6387958cf958a899b158e7bf15a76727a017b723bfc2db59bd9232e943e231c
-
SSDEEP
1536:yivvgT+Qas0ko5sj1D0ETchhJa0py+fGmV9I6lyd0:H20BOj1D0cQpGmVXV
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1304 26bc36dc9039de37d753d3e6f84c6b63.exe -
Executes dropped EXE 1 IoCs
pid Process 1304 26bc36dc9039de37d753d3e6f84c6b63.exe -
Loads dropped DLL 1 IoCs
pid Process 2064 26bc36dc9039de37d753d3e6f84c6b63.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2064 26bc36dc9039de37d753d3e6f84c6b63.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2064 26bc36dc9039de37d753d3e6f84c6b63.exe 1304 26bc36dc9039de37d753d3e6f84c6b63.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1304 2064 26bc36dc9039de37d753d3e6f84c6b63.exe 17 PID 2064 wrote to memory of 1304 2064 26bc36dc9039de37d753d3e6f84c6b63.exe 17 PID 2064 wrote to memory of 1304 2064 26bc36dc9039de37d753d3e6f84c6b63.exe 17 PID 2064 wrote to memory of 1304 2064 26bc36dc9039de37d753d3e6f84c6b63.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\26bc36dc9039de37d753d3e6f84c6b63.exe"C:\Users\Admin\AppData\Local\Temp\26bc36dc9039de37d753d3e6f84c6b63.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\26bc36dc9039de37d753d3e6f84c6b63.exeC:\Users\Admin\AppData\Local\Temp\26bc36dc9039de37d753d3e6f84c6b63.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1304
-