Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 06:38
Behavioral task
behavioral1
Sample
4302b5673580fecff89a953c8aed2c58.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4302b5673580fecff89a953c8aed2c58.exe
Resource
win10v2004-20231222-en
General
-
Target
4302b5673580fecff89a953c8aed2c58.exe
-
Size
1.3MB
-
MD5
4302b5673580fecff89a953c8aed2c58
-
SHA1
8557239cd577ba5cda26ba99fb7d4dd87a335614
-
SHA256
fb71fc80b8902907b26fc59beb82d65b7d2f088fc8e9874ca17728326222a89d
-
SHA512
6d1a4c66913bf95a7ea96790a232e052b456d980fd43bfaf73f9f9e2d9b62ab6316e5556ffb5065ce812d16808e5d330b7daae21ff47c29d03aa8de651fd582e
-
SSDEEP
24576:eA/CVXxJej38kLISa6KAp1doiYLqYAP8nvhiSWLAhvG:ehVLeL8kLe6KcdhYv6SEL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2820 4302b5673580fecff89a953c8aed2c58.exe -
Executes dropped EXE 1 IoCs
pid Process 2820 4302b5673580fecff89a953c8aed2c58.exe -
Loads dropped DLL 1 IoCs
pid Process 2240 4302b5673580fecff89a953c8aed2c58.exe -
resource yara_rule behavioral1/files/0x000b0000000126ab-16.dat upx behavioral1/files/0x000b0000000126ab-11.dat upx behavioral1/memory/2240-0-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2240 4302b5673580fecff89a953c8aed2c58.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2240 4302b5673580fecff89a953c8aed2c58.exe 2820 4302b5673580fecff89a953c8aed2c58.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2820 2240 4302b5673580fecff89a953c8aed2c58.exe 17 PID 2240 wrote to memory of 2820 2240 4302b5673580fecff89a953c8aed2c58.exe 17 PID 2240 wrote to memory of 2820 2240 4302b5673580fecff89a953c8aed2c58.exe 17 PID 2240 wrote to memory of 2820 2240 4302b5673580fecff89a953c8aed2c58.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\4302b5673580fecff89a953c8aed2c58.exe"C:\Users\Admin\AppData\Local\Temp\4302b5673580fecff89a953c8aed2c58.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\4302b5673580fecff89a953c8aed2c58.exeC:\Users\Admin\AppData\Local\Temp\4302b5673580fecff89a953c8aed2c58.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2820
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD55b0cbb8bce2f3d82a6f70e5cc52e8d07
SHA18528d252c06d7bfb4557913a150cba8b836edc72
SHA256e001f5630ac72530b84c87ae61f3b66a40e5ff22e1607f55906010e9d7fac129
SHA51247ca522cc766e7df4e10f7961c9ac9519425d94234123015f26927b7bd8542fdede8257f8562be89f76e9471b0230bed314d6f98b5c3b1925d443dbf02e749fe