Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 22:17
Behavioral task
behavioral1
Sample
3f29b2acad26288bc4fb5e5d6455d0c8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f29b2acad26288bc4fb5e5d6455d0c8.exe
Resource
win10v2004-20231215-en
General
-
Target
3f29b2acad26288bc4fb5e5d6455d0c8.exe
-
Size
6.6MB
-
MD5
3f29b2acad26288bc4fb5e5d6455d0c8
-
SHA1
37aac9ded6bdde255b505b1e75a46912b1887578
-
SHA256
4fa13c7aaec43fb4c26709239f0f996e363bb8ac0f284d36f6b16295302ec064
-
SHA512
a0a6322ac90ce4f227c19588618376bd026b7becec96262aa3d379b9790639f861f77ed63467d7f420ef85894a60f857753be86a284155d8ea4995e8ed710a60
-
SSDEEP
196608:dePaCsXDjDyf6L2WliXYrHW1L/NTEx5uBK:QPaCEDVL2ciIrHWR/NTEq
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2444 3f29b2acad26288bc4fb5e5d6455d0c8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2444 3032 3f29b2acad26288bc4fb5e5d6455d0c8.exe 28 PID 3032 wrote to memory of 2444 3032 3f29b2acad26288bc4fb5e5d6455d0c8.exe 28 PID 3032 wrote to memory of 2444 3032 3f29b2acad26288bc4fb5e5d6455d0c8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f29b2acad26288bc4fb5e5d6455d0c8.exe"C:\Users\Admin\AppData\Local\Temp\3f29b2acad26288bc4fb5e5d6455d0c8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\3f29b2acad26288bc4fb5e5d6455d0c8.exe"C:\Users\Admin\AppData\Local\Temp\3f29b2acad26288bc4fb5e5d6455d0c8.exe"2⤵
- Loads dropped DLL
PID:2444
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD51d5e4c20a20740f38f061bdf48aaca4f
SHA1de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0
SHA256f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366
SHA5129df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397