Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 21:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3f163a6401eadd11f42fa74267a5957f.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f163a6401eadd11f42fa74267a5957f.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
3f163a6401eadd11f42fa74267a5957f.exe
-
Size
82KB
-
MD5
3f163a6401eadd11f42fa74267a5957f
-
SHA1
68dea358f78da13127df7e41969060dc3c741bc1
-
SHA256
18f1ec5b391181be3b7254e4fdf47e3b11a335aa866a8aed72ad4ac5cfd6c35f
-
SHA512
2d746d679ee0a9b07334a0e355cbb9a15b63cc4801b3235c31516b576367f7ffc4bd3c8e79921afb60aacec1b8fb4f586567977f9fb213da67d173ea36232233
-
SSDEEP
1536:vKgHB8/XNuxIAQLg1IuFmdSOA62pRNXUdrQtFp:vsNuTQHbdSOATNEBQtFp
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2952 3f163a6401eadd11f42fa74267a5957f.exe -
Executes dropped EXE 1 IoCs
pid Process 2952 3f163a6401eadd11f42fa74267a5957f.exe -
Loads dropped DLL 1 IoCs
pid Process 2932 3f163a6401eadd11f42fa74267a5957f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2932 3f163a6401eadd11f42fa74267a5957f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2932 3f163a6401eadd11f42fa74267a5957f.exe 2952 3f163a6401eadd11f42fa74267a5957f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2952 2932 3f163a6401eadd11f42fa74267a5957f.exe 14 PID 2932 wrote to memory of 2952 2932 3f163a6401eadd11f42fa74267a5957f.exe 14 PID 2932 wrote to memory of 2952 2932 3f163a6401eadd11f42fa74267a5957f.exe 14 PID 2932 wrote to memory of 2952 2932 3f163a6401eadd11f42fa74267a5957f.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f163a6401eadd11f42fa74267a5957f.exeC:\Users\Admin\AppData\Local\Temp\3f163a6401eadd11f42fa74267a5957f.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2952
-
C:\Users\Admin\AppData\Local\Temp\3f163a6401eadd11f42fa74267a5957f.exe"C:\Users\Admin\AppData\Local\Temp\3f163a6401eadd11f42fa74267a5957f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2932