Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
407157a04d6dfc0d979119001083d46a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
407157a04d6dfc0d979119001083d46a.exe
Resource
win10v2004-20231215-en
General
-
Target
407157a04d6dfc0d979119001083d46a.exe
-
Size
744KB
-
MD5
407157a04d6dfc0d979119001083d46a
-
SHA1
e755e4e8ce0ec458e6623977def3a6c36832aab6
-
SHA256
e46878754e0604bfbd8cd833359421508c245c97947c407c092064980e4db6d3
-
SHA512
f9aa416795f4e83a7b48e45d6f52e3ea5d3b6d783e8731748dfaed8c5960105fc80081f50928a1cb8883d9b0784f600eb88d31537329e10b8e6fb15705046550
-
SSDEEP
12288:uaHc64b888888888888W888888888889jscV7TdjL47zdU5imqsX3sv33rD+zG/A:F86IIW7uvmQBsHUezG/aYFkJR30F6rpB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2400 407157a04d6dfc0d979119001083d46a.tmp -
Loads dropped DLL 1 IoCs
pid Process 2252 407157a04d6dfc0d979119001083d46a.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2400 407157a04d6dfc0d979119001083d46a.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2400 2252 407157a04d6dfc0d979119001083d46a.exe 14 PID 2252 wrote to memory of 2400 2252 407157a04d6dfc0d979119001083d46a.exe 14 PID 2252 wrote to memory of 2400 2252 407157a04d6dfc0d979119001083d46a.exe 14 PID 2252 wrote to memory of 2400 2252 407157a04d6dfc0d979119001083d46a.exe 14 PID 2252 wrote to memory of 2400 2252 407157a04d6dfc0d979119001083d46a.exe 14 PID 2252 wrote to memory of 2400 2252 407157a04d6dfc0d979119001083d46a.exe 14 PID 2252 wrote to memory of 2400 2252 407157a04d6dfc0d979119001083d46a.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\is-9K7S4.tmp\407157a04d6dfc0d979119001083d46a.tmp"C:\Users\Admin\AppData\Local\Temp\is-9K7S4.tmp\407157a04d6dfc0d979119001083d46a.tmp" /SL5="$4001C,371795,121344,C:\Users\Admin\AppData\Local\Temp\407157a04d6dfc0d979119001083d46a.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2400
-
C:\Users\Admin\AppData\Local\Temp\407157a04d6dfc0d979119001083d46a.exe"C:\Users\Admin\AppData\Local\Temp\407157a04d6dfc0d979119001083d46a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2252