Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 21:46
Behavioral task
behavioral1
Sample
3f1ae38001fcd469617f98bb262c1e74.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f1ae38001fcd469617f98bb262c1e74.exe
Resource
win10v2004-20231215-en
General
-
Target
3f1ae38001fcd469617f98bb262c1e74.exe
-
Size
1.3MB
-
MD5
3f1ae38001fcd469617f98bb262c1e74
-
SHA1
d2992cb0a979f9b5f63abc85d7124d20a2ed677c
-
SHA256
65a77bc66d0cf4c305c38a883a64227d3dfaf7312075ca054ed3023b10bf1996
-
SHA512
6f0f75db11138ada7d678ae61d9467fdb4605713fdfcc8d98a3e65260cc1fb673854c2db6d91fe24f08e8a6c180487e80e2e842a0dc67e79fa627d93a437800c
-
SSDEEP
24576:M9GCIMeDTrcRJ2/710qJGHuJgvnHvXxHMtHsa///Si9ws6y2SU9/9Us:MMC8IIJjJGrXxHMN7P4R9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2244 3f1ae38001fcd469617f98bb262c1e74.exe -
Executes dropped EXE 1 IoCs
pid Process 2244 3f1ae38001fcd469617f98bb262c1e74.exe -
Loads dropped DLL 1 IoCs
pid Process 1352 3f1ae38001fcd469617f98bb262c1e74.exe -
resource yara_rule behavioral1/memory/1352-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x000d0000000122dc-10.dat upx behavioral1/files/0x000d0000000122dc-13.dat upx behavioral1/memory/2244-17-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1352 3f1ae38001fcd469617f98bb262c1e74.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1352 3f1ae38001fcd469617f98bb262c1e74.exe 2244 3f1ae38001fcd469617f98bb262c1e74.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1352 wrote to memory of 2244 1352 3f1ae38001fcd469617f98bb262c1e74.exe 28 PID 1352 wrote to memory of 2244 1352 3f1ae38001fcd469617f98bb262c1e74.exe 28 PID 1352 wrote to memory of 2244 1352 3f1ae38001fcd469617f98bb262c1e74.exe 28 PID 1352 wrote to memory of 2244 1352 3f1ae38001fcd469617f98bb262c1e74.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f1ae38001fcd469617f98bb262c1e74.exe"C:\Users\Admin\AppData\Local\Temp\3f1ae38001fcd469617f98bb262c1e74.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\3f1ae38001fcd469617f98bb262c1e74.exeC:\Users\Admin\AppData\Local\Temp\3f1ae38001fcd469617f98bb262c1e74.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2244
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD5875305eeab3f84a5cfc23993fb099495
SHA17d038e9770a81eff3af05a9ccc20262ab6d2991b
SHA256181c7872776fa78a593681cccb6c48c674bd2b4becf977d53b58ed6e66b625b7
SHA5126b72d750fddc6a04c4b8f65ee6f0593359d4206ee09b5068201c778d1352a332a15d4e0a753d79f4ef32339cea02a297465a48fdc33ffcfeeec5e69d2eacf050
-
Filesize
65KB
MD501ba24277f05ac481a24c5f574e6e6ea
SHA10961380b824bb05881e01620c8f75ea856afc278
SHA256562c93f940555678dd96b02bb30f17d8d0ff0b4164ff909f0dfdbe289e223add
SHA512988bc07bc6eb66547f5d4bec10b9094331739fc03bb26b2701334f4d0cb06b4c6ef2291187cb3e46f6a9a9739da31c8135c2388b6719822d8b78f82bcda2b756