Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 03:02

General

  • Target

    25911a9eee0aa7f0e0dca629ae13372b.exe

  • Size

    162KB

  • MD5

    25911a9eee0aa7f0e0dca629ae13372b

  • SHA1

    05ab3ba246621b86d61fdf5560069ffb2492c8f5

  • SHA256

    499e86849943f1d29780587dea989f18c60c31867251ec28b8574958aafb0c6d

  • SHA512

    c198e0ad5cdda7d40e4459712a0a63e63a772b811afce3456ba71d45a1ff477bd8868a51aa032d5e0ba4e5e57c8832d54c6ae89438944e87122b2225cd1cdce0

  • SSDEEP

    3072:JIgsXeMEaPJKruNFJltpQYYV9Z7jhxdktQK5WvYGEBhkbIDw3IV:6XnEaPJ3/t+V/79ziQK5WvYJBhkbIyS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25911a9eee0aa7f0e0dca629ae13372b.exe
    "C:\Users\Admin\AppData\Local\Temp\25911a9eee0aa7f0e0dca629ae13372b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\25911a9eee0aa7f0e0dca629ae13372b.exe
      C:\Users\Admin\AppData\Local\Temp\25911a9eee0aa7f0e0dca629ae13372b.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1652

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\25911a9eee0aa7f0e0dca629ae13372b.exe

    Filesize

    162KB

    MD5

    d73d6bf245d761efbee7c4c30cc439bf

    SHA1

    eb1760c533fe572a45f5afaae4daaed55c2e98cf

    SHA256

    69c396934bf87ff24e24da4f5473f7aed828c4f662ad12fe5c2b146cc0707f8b

    SHA512

    0283a49aa3e41c4e2213aebd725ee50cdb627cf88f83fbaef8aec1cdde9fe0d42a3061bbdc98503891a1728e94bff8f6600423449230f1575bc3862323a47768

  • memory/1652-18-0x0000000000140000-0x000000000016E000-memory.dmp

    Filesize

    184KB

  • memory/1652-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1652-29-0x00000000001A0000-0x00000000001BB000-memory.dmp

    Filesize

    108KB

  • memory/1652-24-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1712-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1712-2-0x0000000000140000-0x000000000016E000-memory.dmp

    Filesize

    184KB

  • memory/1712-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1712-15-0x0000000000190000-0x00000000001BE000-memory.dmp

    Filesize

    184KB

  • memory/1712-14-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB