Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 00:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3f7d088afd8d2b93c003ba513b8a5534.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f7d088afd8d2b93c003ba513b8a5534.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
3f7d088afd8d2b93c003ba513b8a5534.exe
-
Size
385KB
-
MD5
3f7d088afd8d2b93c003ba513b8a5534
-
SHA1
184f868394acec1091e84caf7894c43b8689de47
-
SHA256
aede44db6447287c88450d6dd1cd142a8737f641f9dd46b5290c991ec0caa5d8
-
SHA512
c9cfd60e95e9974e023ee1902763d324a94fa51b83e76a0b58720dc676bffc691e7a7900633daa36d724d82ec69e5b38e79fba1f2bc5d162d06c1c6fc3928d22
-
SSDEEP
6144:oiXanJgmNb+8DyVCyhf6EO0tj5Gq7E4Tv2f+/fWbBXBWhAZG8r90/lQ1fagB:oiXal+lhhf40tj55vU+mXtZGB/eB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2664 3f7d088afd8d2b93c003ba513b8a5534.exe -
Executes dropped EXE 1 IoCs
pid Process 2664 3f7d088afd8d2b93c003ba513b8a5534.exe -
Loads dropped DLL 1 IoCs
pid Process 2420 3f7d088afd8d2b93c003ba513b8a5534.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2420 3f7d088afd8d2b93c003ba513b8a5534.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2420 3f7d088afd8d2b93c003ba513b8a5534.exe 2664 3f7d088afd8d2b93c003ba513b8a5534.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2664 2420 3f7d088afd8d2b93c003ba513b8a5534.exe 16 PID 2420 wrote to memory of 2664 2420 3f7d088afd8d2b93c003ba513b8a5534.exe 16 PID 2420 wrote to memory of 2664 2420 3f7d088afd8d2b93c003ba513b8a5534.exe 16 PID 2420 wrote to memory of 2664 2420 3f7d088afd8d2b93c003ba513b8a5534.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f7d088afd8d2b93c003ba513b8a5534.exe"C:\Users\Admin\AppData\Local\Temp\3f7d088afd8d2b93c003ba513b8a5534.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\3f7d088afd8d2b93c003ba513b8a5534.exeC:\Users\Admin\AppData\Local\Temp\3f7d088afd8d2b93c003ba513b8a5534.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2664
-