Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 14:00

General

  • Target

    38fb4e2e554987e3385470f694ec1f47.exe

  • Size

    57KB

  • MD5

    38fb4e2e554987e3385470f694ec1f47

  • SHA1

    5b90e9e0117f2338ce5259491d7f641dbbbeef50

  • SHA256

    5b4d80e66ae2803af5015c7b105247fa0a12953381896e3ef0a93c39b4556951

  • SHA512

    db3af8593bd908c066c0be0cc587c27c36bb188bf21037d6c89cdfd2bf54677cbd5c208b3c81d8320d8920eee446a0a55012d0d6f1b1f2047e05b4999f66f140

  • SSDEEP

    1536:h8ml7kajLRvxP/Ph8o4kUasb41x4jq9m7J:KeII3HPmS6M1x4jJ9

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38fb4e2e554987e3385470f694ec1f47.exe
    "C:\Users\Admin\AppData\Local\Temp\38fb4e2e554987e3385470f694ec1f47.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\38fb4e2e554987e3385470f694ec1f47.exe
      C:\Users\Admin\AppData\Local\Temp\38fb4e2e554987e3385470f694ec1f47.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2828

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\38fb4e2e554987e3385470f694ec1f47.exe

    Filesize

    57KB

    MD5

    233777560e1c6821a7186a97f8a7135d

    SHA1

    1e34aac909660888fc2ada35c26279f0cde17129

    SHA256

    85b82c3977c4e5d9e4e500c3d50980bb286331f21349a5e2e22fe32eee2294fb

    SHA512

    6b2d89c622e95eb1bf41e5b0a3ddc5cb455564a44e621c002f2146b645358f0ca397777560f5dc002d914698c134554e3d2941257e871aeacb32174f93b45a7d

  • memory/2828-17-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2828-18-0x0000000000170000-0x000000000019C000-memory.dmp

    Filesize

    176KB

  • memory/2828-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2828-27-0x0000000000320000-0x000000000033B000-memory.dmp

    Filesize

    108KB

  • memory/2828-29-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3028-0-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3028-1-0x0000000000140000-0x000000000016C000-memory.dmp

    Filesize

    176KB

  • memory/3028-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3028-12-0x0000000000180000-0x00000000001AC000-memory.dmp

    Filesize

    176KB

  • memory/3028-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB