Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2ab4f29250802fbe652579addb463f64.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ab4f29250802fbe652579addb463f64.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
2ab4f29250802fbe652579addb463f64.exe
-
Size
84KB
-
MD5
2ab4f29250802fbe652579addb463f64
-
SHA1
efafadda39739bd466321d3254c78734a8252fa2
-
SHA256
e5dc6f50a87e4a2e83bd8d63d1c43de3683a829642788bb2a63bb04286d7d915
-
SHA512
386eff84a2c8255a2455e9d3c4189fcb3063ebe9225f9db25c03af337c23c430f8b319f8c67b550c89661999e8c3bd5cbc204dd2a8b4f26c78fcaa4f865c02c3
-
SSDEEP
1536:haJmWoD6IX4aPJkobpkLHj2Od4zlIWdVxj43yoQWzK4PhNdTfrraC8T6uE4672rw:h3l6IX4/k+HqOizC2BftJAHdTalG46q8
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3016 2ab4f29250802fbe652579addb463f64.exe -
Executes dropped EXE 1 IoCs
pid Process 3016 2ab4f29250802fbe652579addb463f64.exe -
Loads dropped DLL 1 IoCs
pid Process 2848 2ab4f29250802fbe652579addb463f64.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2848 2ab4f29250802fbe652579addb463f64.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2848 2ab4f29250802fbe652579addb463f64.exe 3016 2ab4f29250802fbe652579addb463f64.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 3016 2848 2ab4f29250802fbe652579addb463f64.exe 16 PID 2848 wrote to memory of 3016 2848 2ab4f29250802fbe652579addb463f64.exe 16 PID 2848 wrote to memory of 3016 2848 2ab4f29250802fbe652579addb463f64.exe 16 PID 2848 wrote to memory of 3016 2848 2ab4f29250802fbe652579addb463f64.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ab4f29250802fbe652579addb463f64.exe"C:\Users\Admin\AppData\Local\Temp\2ab4f29250802fbe652579addb463f64.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\2ab4f29250802fbe652579addb463f64.exeC:\Users\Admin\AppData\Local\Temp\2ab4f29250802fbe652579addb463f64.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3016
-