Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
25911a9eee0aa7f0e0dca629ae13372b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
25911a9eee0aa7f0e0dca629ae13372b.exe
Resource
win10v2004-20231215-en
General
-
Target
25911a9eee0aa7f0e0dca629ae13372b.exe
-
Size
162KB
-
MD5
25911a9eee0aa7f0e0dca629ae13372b
-
SHA1
05ab3ba246621b86d61fdf5560069ffb2492c8f5
-
SHA256
499e86849943f1d29780587dea989f18c60c31867251ec28b8574958aafb0c6d
-
SHA512
c198e0ad5cdda7d40e4459712a0a63e63a772b811afce3456ba71d45a1ff477bd8868a51aa032d5e0ba4e5e57c8832d54c6ae89438944e87122b2225cd1cdce0
-
SSDEEP
3072:JIgsXeMEaPJKruNFJltpQYYV9Z7jhxdktQK5WvYGEBhkbIDw3IV:6XnEaPJ3/t+V/79ziQK5WvYJBhkbIyS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1652 25911a9eee0aa7f0e0dca629ae13372b.exe -
Executes dropped EXE 1 IoCs
pid Process 1652 25911a9eee0aa7f0e0dca629ae13372b.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 25911a9eee0aa7f0e0dca629ae13372b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1712 25911a9eee0aa7f0e0dca629ae13372b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1712 25911a9eee0aa7f0e0dca629ae13372b.exe 1652 25911a9eee0aa7f0e0dca629ae13372b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1652 1712 25911a9eee0aa7f0e0dca629ae13372b.exe 29 PID 1712 wrote to memory of 1652 1712 25911a9eee0aa7f0e0dca629ae13372b.exe 29 PID 1712 wrote to memory of 1652 1712 25911a9eee0aa7f0e0dca629ae13372b.exe 29 PID 1712 wrote to memory of 1652 1712 25911a9eee0aa7f0e0dca629ae13372b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\25911a9eee0aa7f0e0dca629ae13372b.exe"C:\Users\Admin\AppData\Local\Temp\25911a9eee0aa7f0e0dca629ae13372b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\25911a9eee0aa7f0e0dca629ae13372b.exeC:\Users\Admin\AppData\Local\Temp\25911a9eee0aa7f0e0dca629ae13372b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1652
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD5d73d6bf245d761efbee7c4c30cc439bf
SHA1eb1760c533fe572a45f5afaae4daaed55c2e98cf
SHA25669c396934bf87ff24e24da4f5473f7aed828c4f662ad12fe5c2b146cc0707f8b
SHA5120283a49aa3e41c4e2213aebd725ee50cdb627cf88f83fbaef8aec1cdde9fe0d42a3061bbdc98503891a1728e94bff8f6600423449230f1575bc3862323a47768