Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 03:12
Behavioral task
behavioral1
Sample
3fbfbe826e08a2a271f84a33560cd2a5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3fbfbe826e08a2a271f84a33560cd2a5.exe
Resource
win10v2004-20231215-en
General
-
Target
3fbfbe826e08a2a271f84a33560cd2a5.exe
-
Size
2.9MB
-
MD5
3fbfbe826e08a2a271f84a33560cd2a5
-
SHA1
619136c0bd209936fd68a714ee98e544f188c2eb
-
SHA256
a1d1158377adb16837fb6ba9834b787252c43642d675ee63d080745675e8a538
-
SHA512
a37eccaf7d4461c1a98d71cacf44f5f130409a42ab183a6accd399be7219a7fdce795210a8ed5243e2754a2189f7584ff5e9c36612c673bfa17b5cd20c78bec3
-
SSDEEP
49152:GlVLUg1iuc8NHB/ZJG4RNfkOynzngGnhD19I8P4M338dB2IBlGuuDVUsdxxjeQZ5:GlxU8iB8/1RNfMnznpvbgg3gnl/IVUsn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1340 3fbfbe826e08a2a271f84a33560cd2a5.exe -
Executes dropped EXE 1 IoCs
pid Process 1340 3fbfbe826e08a2a271f84a33560cd2a5.exe -
Loads dropped DLL 1 IoCs
pid Process 2144 3fbfbe826e08a2a271f84a33560cd2a5.exe -
resource yara_rule behavioral1/memory/2144-2-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x0009000000012252-10.dat upx behavioral1/files/0x0009000000012252-13.dat upx behavioral1/memory/1340-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2144 3fbfbe826e08a2a271f84a33560cd2a5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2144 3fbfbe826e08a2a271f84a33560cd2a5.exe 1340 3fbfbe826e08a2a271f84a33560cd2a5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 1340 2144 3fbfbe826e08a2a271f84a33560cd2a5.exe 28 PID 2144 wrote to memory of 1340 2144 3fbfbe826e08a2a271f84a33560cd2a5.exe 28 PID 2144 wrote to memory of 1340 2144 3fbfbe826e08a2a271f84a33560cd2a5.exe 28 PID 2144 wrote to memory of 1340 2144 3fbfbe826e08a2a271f84a33560cd2a5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fbfbe826e08a2a271f84a33560cd2a5.exe"C:\Users\Admin\AppData\Local\Temp\3fbfbe826e08a2a271f84a33560cd2a5.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\3fbfbe826e08a2a271f84a33560cd2a5.exeC:\Users\Admin\AppData\Local\Temp\3fbfbe826e08a2a271f84a33560cd2a5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1340
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD53b0bffa0e195edd82271a0ad627f7533
SHA115af3713966861834902609e1ed28e123c4b054c
SHA256e14b9c2437f5ddea99a1b0e0210b0837920f5aaa465680eb778cce80b95c3800
SHA512e9a541332d4632037ab64e86d7b96ee367d6a2e0c59d64a89f322039e0b5e15f217f3aadfc621c40dc6a375285abb0614ee1cc3ddc4b8912e5dae26796e301cd
-
Filesize
455KB
MD576ae357cbe339da6bc1bb34fa4652e53
SHA1302c7e87877049f3d1a2e6432177366268da084c
SHA256e5986221b6489668afe4b9280ad2706df62c0a4817fad6a7d120b8691e80b5cb
SHA51277b68d6143e35d8262509470f82352f059ea5f141b4b9f79fc61d47ac0abaad2a10c2f498b085f4aac6fe8fd76eaa65d392429736ef9c235e05cbffe5a941014