Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
267s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 11:06
Behavioral task
behavioral1
Sample
3caf6ab2383376bbcbeb0384ac4337b6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3caf6ab2383376bbcbeb0384ac4337b6.exe
Resource
win10v2004-20231215-en
General
-
Target
3caf6ab2383376bbcbeb0384ac4337b6.exe
-
Size
2.7MB
-
MD5
3caf6ab2383376bbcbeb0384ac4337b6
-
SHA1
9267953185404b77521cd6412de4cd8a604dca30
-
SHA256
d116d9356b476cf28a5d0ec1abd31b8af494ec500bd4e0d6643f90cc271f44db
-
SHA512
ae4b64de26b8c5c905dffcdbe4893a896205eae802125666521d377dca8fa4fcdbca126fd7083901ccc1884b018c69227d36568cd07e5574c782685b064fd3be
-
SSDEEP
49152:PiJdnudvEoZwbI0VogCq3cFuXxw0ZkwqAU+i+d5EjoqQDvx1cp:qTudvEoZw+icFuhw4LqAUzW5crQDvjcp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1636 3caf6ab2383376bbcbeb0384ac4337b6.exe -
Executes dropped EXE 1 IoCs
pid Process 1636 3caf6ab2383376bbcbeb0384ac4337b6.exe -
Loads dropped DLL 1 IoCs
pid Process 2736 3caf6ab2383376bbcbeb0384ac4337b6.exe -
resource yara_rule behavioral1/memory/2736-3-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x0004000000004ed7-10.dat upx behavioral1/memory/2736-12-0x0000000003750000-0x0000000003C3F000-memory.dmp upx behavioral1/files/0x0004000000004ed7-14.dat upx behavioral1/files/0x0004000000004ed7-13.dat upx behavioral1/memory/1636-15-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2736 3caf6ab2383376bbcbeb0384ac4337b6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2736 3caf6ab2383376bbcbeb0384ac4337b6.exe 1636 3caf6ab2383376bbcbeb0384ac4337b6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 1636 2736 3caf6ab2383376bbcbeb0384ac4337b6.exe 27 PID 2736 wrote to memory of 1636 2736 3caf6ab2383376bbcbeb0384ac4337b6.exe 27 PID 2736 wrote to memory of 1636 2736 3caf6ab2383376bbcbeb0384ac4337b6.exe 27 PID 2736 wrote to memory of 1636 2736 3caf6ab2383376bbcbeb0384ac4337b6.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\3caf6ab2383376bbcbeb0384ac4337b6.exe"C:\Users\Admin\AppData\Local\Temp\3caf6ab2383376bbcbeb0384ac4337b6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\3caf6ab2383376bbcbeb0384ac4337b6.exeC:\Users\Admin\AppData\Local\Temp\3caf6ab2383376bbcbeb0384ac4337b6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1636
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5f46be50b865340a594d69beeef973bd8
SHA1acb4dc4dff5b2f588952e63cee9bf33033ff22c1
SHA256ad53e12417cdc69ab5bd2b2ae41c0e84a44f627638def9dc545abbd884293538
SHA51204b44e4113fa8c59bb0cacbc990e7a3727b927d331fd825944b1aa28f683f2cde7fb7dac04eae4a483481065f42ee6df20105f11906efecb0baee0984b988242
-
Filesize
1.3MB
MD5821c418ad05361af561b498865b34632
SHA1c27087e82cd5f4a41a2bfed0eb6af70fe792f8c7
SHA256ec18be9790e8ea404435bf0ff1b6f10bb8c5b2e133a05cbfd4f441fa37b5145e
SHA512b435d79e8ee67a2e93dc21bfbb29a68ef7a1a0641e178cee60c598be5a2a790670e05b4d8b8ecd9664fee701e8ef99144e2bf1e39c04cdbee2cb59888e8d9c9b
-
Filesize
1.8MB
MD5333f60a1a21ca96242fbbbb675935465
SHA15805411f5d5f39ad4f946bcd48d7633dc778f549
SHA256b315771e426d6fde0b6c66b1be9c1d85289c235b1d1295ad8f10f94f49cd3775
SHA512f72532e013b9f4a4f99adcdaddcb26e52bbf2c86e53904c8a0c6bff3d6da7d73eec39495d05a052d609a460be884f7e3236bf485fdb9ffdada15053d51aae4df