Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 07:24
Behavioral task
behavioral1
Sample
2d47e50fa539a5beb41de427670a2832.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d47e50fa539a5beb41de427670a2832.exe
Resource
win10v2004-20231215-en
General
-
Target
2d47e50fa539a5beb41de427670a2832.exe
-
Size
2.7MB
-
MD5
2d47e50fa539a5beb41de427670a2832
-
SHA1
31541f8ffc5ec7d0a7594071c143aebafedc5f43
-
SHA256
2410e835d44ad7b678a66734728a7266cfe36ec4249e3250243c28bcae6e85a8
-
SHA512
60be5dc14ab465f93f997c430e8d85225f7eaec4f5d6d74abae8296f412154700f35668a1130260902a7318c6468070acf10996ccf281cd133f084d89196911e
-
SSDEEP
49152:uEJaPE6mBXpsEwyxES28R9cF5OonzWMnpMax+SW0IcWpAfejR9j:xaDm5pp1128HcFoLWT+SW0xWvHj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2204 2d47e50fa539a5beb41de427670a2832.exe -
Executes dropped EXE 1 IoCs
pid Process 2204 2d47e50fa539a5beb41de427670a2832.exe -
Loads dropped DLL 1 IoCs
pid Process 2484 2d47e50fa539a5beb41de427670a2832.exe -
resource yara_rule behavioral1/memory/2484-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x00050000000120fa-10.dat upx behavioral1/memory/2204-16-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x00050000000120fa-14.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2484 2d47e50fa539a5beb41de427670a2832.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2484 2d47e50fa539a5beb41de427670a2832.exe 2204 2d47e50fa539a5beb41de427670a2832.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2204 2484 2d47e50fa539a5beb41de427670a2832.exe 28 PID 2484 wrote to memory of 2204 2484 2d47e50fa539a5beb41de427670a2832.exe 28 PID 2484 wrote to memory of 2204 2484 2d47e50fa539a5beb41de427670a2832.exe 28 PID 2484 wrote to memory of 2204 2484 2d47e50fa539a5beb41de427670a2832.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d47e50fa539a5beb41de427670a2832.exe"C:\Users\Admin\AppData\Local\Temp\2d47e50fa539a5beb41de427670a2832.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\2d47e50fa539a5beb41de427670a2832.exeC:\Users\Admin\AppData\Local\Temp\2d47e50fa539a5beb41de427670a2832.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2204
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD5b848a3cfa22b7bb95a2cbf70e7636187
SHA1014b527735c64cf6d6b9b972fa99cc1b7557ca02
SHA2565369f0d94428bd800e3aece451d83713074c031d9b1bc62574e78cd9534338cc
SHA51242f677510c07ff0055927e3790469f39130127bf6dd8a12a603ae9a1cbca581a2a2b2ad613ca3b45da7abe885a6820f4f64e6e76384a4c95cedc0a84cd0d5eef
-
Filesize
386KB
MD5a087b29b13f8e8f843153480e1a64570
SHA1099fa3e5eefced4880d007dbb5a90dd685c8c0b0
SHA256a735bd3d9be0ced9698b2bf8d565c5d3f3186bab355c343414f0b604674cfc31
SHA51205b834d1bc6226619126acc387cb7eac54ff4d1f683cee175fbe3f2299e6f97984dd8cd02930f26b3d27b0d89b40ecad446792581b35a01c216ab74545c77504