Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:10
Behavioral task
behavioral1
Sample
3949541ccb55f6d3667bd8f1f5722ea0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3949541ccb55f6d3667bd8f1f5722ea0.exe
Resource
win10v2004-20231215-en
General
-
Target
3949541ccb55f6d3667bd8f1f5722ea0.exe
-
Size
5.3MB
-
MD5
3949541ccb55f6d3667bd8f1f5722ea0
-
SHA1
3b13f5509325cffb1f372cce348bc1c39ee188e6
-
SHA256
4b087e5f871fa0ce6166440fcfaa0ebea90962bef881581e3779cb516787b527
-
SHA512
084a149f43a1720f3f162c327a7895638b9396368516685a84cb18377cd4978b5f67aca3af799ad87abe7da81c3ca612dbdba87f1488690e5751ead65126fd98
-
SSDEEP
98304:xCMyaa7N98nRJNfHj8FhX6s9CkUjHGzHbkkIKGYWlZgodk7cHj8FhX6s9CkUjHGn:Lyas/YRzfDQhhEdaYCJW0QDQhhEdaD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 3949541ccb55f6d3667bd8f1f5722ea0.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 3949541ccb55f6d3667bd8f1f5722ea0.exe -
Loads dropped DLL 1 IoCs
pid Process 2996 3949541ccb55f6d3667bd8f1f5722ea0.exe -
resource yara_rule behavioral1/memory/2996-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x000a000000012253-10.dat upx behavioral1/memory/2996-15-0x0000000003C90000-0x0000000004177000-memory.dmp upx behavioral1/files/0x000a000000012253-14.dat upx behavioral1/memory/2692-17-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2996 3949541ccb55f6d3667bd8f1f5722ea0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2996 3949541ccb55f6d3667bd8f1f5722ea0.exe 2692 3949541ccb55f6d3667bd8f1f5722ea0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2692 2996 3949541ccb55f6d3667bd8f1f5722ea0.exe 28 PID 2996 wrote to memory of 2692 2996 3949541ccb55f6d3667bd8f1f5722ea0.exe 28 PID 2996 wrote to memory of 2692 2996 3949541ccb55f6d3667bd8f1f5722ea0.exe 28 PID 2996 wrote to memory of 2692 2996 3949541ccb55f6d3667bd8f1f5722ea0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3949541ccb55f6d3667bd8f1f5722ea0.exe"C:\Users\Admin\AppData\Local\Temp\3949541ccb55f6d3667bd8f1f5722ea0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\3949541ccb55f6d3667bd8f1f5722ea0.exeC:\Users\Admin\AppData\Local\Temp\3949541ccb55f6d3667bd8f1f5722ea0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2692
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD5063886a360d820a171c4e4f498067d8f
SHA1ce0452b7db59c0f9576655b9475016af52ef3b35
SHA2563202f173e75da9b19d71f2e9cd418a420f2651ed7fb802a712901e1a9520bf6a
SHA512d48aa3ac710376e0c34766efb0aa182a21f38e57f9ee1f212f36c714fe5dc4011643afb25b1f04c9a30bad85e8995df2ac44b3a340c697f215e2baa3461672e6
-
Filesize
338KB
MD52ea2d2b2dea990074ecdc5a375b71463
SHA1d97cb3a6e90115a2854cb93389d0e6dbcefd8811
SHA25613e7321aff7e2ca2c8ef577f8d8717d3a259eefb61e96132b89bc6a2393bf6e5
SHA5120704d159a678cf4ec6dcfa533fa6a5ae5c451ecc5248cbc8c9bc0339af7d4e887aebc820bff37b7adb2bf3f07e5bc45be93809332009ce343d59a5ccb5088188