Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:41
Behavioral task
behavioral1
Sample
2c018166edaa37abb0719af06fc4d05c.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c018166edaa37abb0719af06fc4d05c.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
2c018166edaa37abb0719af06fc4d05c.exe
-
Size
5.8MB
-
MD5
2c018166edaa37abb0719af06fc4d05c
-
SHA1
b20f1a65cced7a5e1e99af5a483908ac3ffaf0f2
-
SHA256
e6f0db6a23e1f975fc768292a78b6c07cf2290ab986b6fec55d069e3ec298a06
-
SHA512
d55c518610c2ca1c30f080baf6e4c1639dbc97e264fce8b7aabc7d28f72199eecd2ca5fcd196666f3fdcd9aee3a8922cdc949854720b0f9ee2e8d64091628cf9
-
SSDEEP
98304:Nb6lggIlLY4c05G/Hau42c1joCjMPkNwk6alDAqD7z3uboHau42c1joCjMPkNwk6:nnlVc0Wauq1jI86FA7y2auq1jI86
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3048 2c018166edaa37abb0719af06fc4d05c.exe -
Executes dropped EXE 1 IoCs
pid Process 3048 2c018166edaa37abb0719af06fc4d05c.exe -
Loads dropped DLL 1 IoCs
pid Process 1272 2c018166edaa37abb0719af06fc4d05c.exe -
resource yara_rule behavioral1/memory/1272-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000d00000001232b-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1272 2c018166edaa37abb0719af06fc4d05c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1272 2c018166edaa37abb0719af06fc4d05c.exe 3048 2c018166edaa37abb0719af06fc4d05c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1272 wrote to memory of 3048 1272 2c018166edaa37abb0719af06fc4d05c.exe 17 PID 1272 wrote to memory of 3048 1272 2c018166edaa37abb0719af06fc4d05c.exe 17 PID 1272 wrote to memory of 3048 1272 2c018166edaa37abb0719af06fc4d05c.exe 17 PID 1272 wrote to memory of 3048 1272 2c018166edaa37abb0719af06fc4d05c.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c018166edaa37abb0719af06fc4d05c.exe"C:\Users\Admin\AppData\Local\Temp\2c018166edaa37abb0719af06fc4d05c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\2c018166edaa37abb0719af06fc4d05c.exeC:\Users\Admin\AppData\Local\Temp\2c018166edaa37abb0719af06fc4d05c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3048
-