Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
18s -
max time network
27s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:16
Static task
static1
Behavioral task
behavioral1
Sample
260e1399561c2ad320b8a3df089bfe02.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
260e1399561c2ad320b8a3df089bfe02.exe
Resource
win10v2004-20231215-en
General
-
Target
260e1399561c2ad320b8a3df089bfe02.exe
-
Size
1.9MB
-
MD5
260e1399561c2ad320b8a3df089bfe02
-
SHA1
b3a502d0a7553736d158a8a19d51b0489f949543
-
SHA256
a4ef869063b73c783dc03b6e40b14cfa7eacf69e179c72c00f8739c2381e682a
-
SHA512
07b15aac0fec899baeb12cc3ae7519a06537ea346c71d58a4e8842f5ed70e88fd79942c9318dc4a1df597fcb651436a56bf1615fba6496248503ffb1b7486889
-
SSDEEP
49152:Qoa1taC070dfA4F0GLrHClKLlCbVFl7NsTbU:Qoa1taC0B4BLTwLlB+U
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2796 A8CD.tmp -
Executes dropped EXE 1 IoCs
pid Process 2796 A8CD.tmp -
Loads dropped DLL 1 IoCs
pid Process 2324 260e1399561c2ad320b8a3df089bfe02.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2796 2324 260e1399561c2ad320b8a3df089bfe02.exe 28 PID 2324 wrote to memory of 2796 2324 260e1399561c2ad320b8a3df089bfe02.exe 28 PID 2324 wrote to memory of 2796 2324 260e1399561c2ad320b8a3df089bfe02.exe 28 PID 2324 wrote to memory of 2796 2324 260e1399561c2ad320b8a3df089bfe02.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\260e1399561c2ad320b8a3df089bfe02.exe"C:\Users\Admin\AppData\Local\Temp\260e1399561c2ad320b8a3df089bfe02.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\A8CD.tmp"C:\Users\Admin\AppData\Local\Temp\A8CD.tmp" --splashC:\Users\Admin\AppData\Local\Temp\260e1399561c2ad320b8a3df089bfe02.exe 704F785906AC14CA40C049412EAE2BE2A7E064A0E27DC990D049614DD5C35EF72F2DA91B9FEE0377505D473E221D9C267C4BCA831D806A77780E18500A4179392⤵
- Deletes itself
- Executes dropped EXE
PID:2796
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD5eef3aeeaf57747e042ed625dbdaede85
SHA1370d7aef013c1e4733d4c7b1f25e24013a5b4d3c
SHA256bf9cf837b64490ab84d2c6589e0664fa9cdb786723b41cca726e43da9b823f53
SHA512c01cf7e0aea2dafba1461bdfab5f7fc937e6fe191c6417e7681b2166a6d50cb857e2c508b0e7b30d0b6741d33f59dd607c53e44cc378e30b1149887b2f9835f6
-
Filesize
425KB
MD52a76f50862f8bfde7980779f7f84b378
SHA1a4a019638965237ae5ce560f0f8f0477fe20d94f
SHA256881163260146d5c8a5055d18d5b4b471e883e7abd712dcc705e609767af3e775
SHA5124250e3d2654eb65edb8fa8658d65d88535efed369956aa7974ef54cef283f9afb33154f7dd59f18ec2e5595853932a9932a44d967507af639307a1b3af8d8bcc