Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
3911d8371fd6fe478d4c2f7cbb85b170.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3911d8371fd6fe478d4c2f7cbb85b170.exe
Resource
win10v2004-20231222-en
General
-
Target
3911d8371fd6fe478d4c2f7cbb85b170.exe
-
Size
109KB
-
MD5
3911d8371fd6fe478d4c2f7cbb85b170
-
SHA1
1ad4518dc51a50f64121cd96e040889824b8e42f
-
SHA256
1e9fbae11533c0c0a4b23bcc2cd310a5de0116c4515a44506b9c369a7d02a222
-
SHA512
391f0162c017ac3bf6bdc86504ad020957d03a6aa9f186737bd4a1c43027a87d83cfa66d1b7eaa1706760a9262b4f29760b159d9a8c3689dba99e532fe2fb444
-
SSDEEP
1536:+06F3hjSDjxe78yJZuP5+ILpBrv7Xv/+WS7lwS6arF5nfOHcGDW4l/rQqHs7:V6ie782ZIPLpBvXnV0lwormHcGK4+yW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 svchost.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2712 NOTEPAD.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2488 3911d8371fd6fe478d4c2f7cbb85b170.exe 2488 3911d8371fd6fe478d4c2f7cbb85b170.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2488 wrote to memory of 3008 2488 3911d8371fd6fe478d4c2f7cbb85b170.exe 28 PID 2488 wrote to memory of 3008 2488 3911d8371fd6fe478d4c2f7cbb85b170.exe 28 PID 2488 wrote to memory of 3008 2488 3911d8371fd6fe478d4c2f7cbb85b170.exe 28 PID 2488 wrote to memory of 3008 2488 3911d8371fd6fe478d4c2f7cbb85b170.exe 28 PID 3008 wrote to memory of 2712 3008 svchost.exe 29 PID 3008 wrote to memory of 2712 3008 svchost.exe 29 PID 3008 wrote to memory of 2712 3008 svchost.exe 29 PID 3008 wrote to memory of 2712 3008 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3911d8371fd6fe478d4c2f7cbb85b170.exe"C:\Users\Admin\AppData\Local\Temp\3911d8371fd6fe478d4c2f7cbb85b170.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\3911d8371fd6fe478d4c2f7cbb85b170.txt3⤵
- Opens file in notepad (likely ransom note)
PID:2712
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD543fb2705d9766ea761f934981936503f
SHA1c9589c81355baab345cd121a76dcd743d65e131c
SHA256766a90366e6cac315d05afc9c97dcd6206a7f66da260dd41d209bb6ad13947e0
SHA512ebf82587e4a8dad580b0c6c6959c73315c584cea82c41c073aab41854a44027fbc63d3f360651e726bfe71bc9e99a1b803574715e63d462f90182291ce3dfbf4