Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 17:00
Static task
static1
Behavioral task
behavioral1
Sample
46bde145972f6fce7ec776eac436a037.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46bde145972f6fce7ec776eac436a037.exe
Resource
win10v2004-20231215-en
General
-
Target
46bde145972f6fce7ec776eac436a037.exe
-
Size
82KB
-
MD5
46bde145972f6fce7ec776eac436a037
-
SHA1
c4292149a83a8d157e794eb59966775d5fe25606
-
SHA256
3a1e3119e990ea7fd28bc1e77c245163a3c8bcab72d7c03716a1cf520072d557
-
SHA512
81b5e11e1dad81175a4a0dd06bc2bb2b59c44bac23c72eacaa5088f6cef8e44079873f8b4fa2bb4ec8b535b7bd15d85a673444946d0c40d314a618245211f8d6
-
SSDEEP
1536:Tt4JywYFuVeZjUsfSJ0HuppJV80aYu6WkoY38ExKatoT80BupwNl46VC2uU4d0BV:T2bdVChqJLppJKDP9Y3vxrE3BfNl46o0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2928 46bde145972f6fce7ec776eac436a037.exe -
Executes dropped EXE 1 IoCs
pid Process 2928 46bde145972f6fce7ec776eac436a037.exe -
Loads dropped DLL 1 IoCs
pid Process 2976 46bde145972f6fce7ec776eac436a037.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2976 46bde145972f6fce7ec776eac436a037.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2976 46bde145972f6fce7ec776eac436a037.exe 2928 46bde145972f6fce7ec776eac436a037.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2928 2976 46bde145972f6fce7ec776eac436a037.exe 29 PID 2976 wrote to memory of 2928 2976 46bde145972f6fce7ec776eac436a037.exe 29 PID 2976 wrote to memory of 2928 2976 46bde145972f6fce7ec776eac436a037.exe 29 PID 2976 wrote to memory of 2928 2976 46bde145972f6fce7ec776eac436a037.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\46bde145972f6fce7ec776eac436a037.exe"C:\Users\Admin\AppData\Local\Temp\46bde145972f6fce7ec776eac436a037.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\46bde145972f6fce7ec776eac436a037.exeC:\Users\Admin\AppData\Local\Temp\46bde145972f6fce7ec776eac436a037.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2928
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5c3d7f77dff3229e5a9fae42bbb438383
SHA1381b5fda191da8f4f961c58e42690a228fb12536
SHA2567e7d5a6e5ddacfbce86d53a5b16e539c7aacfea636b47456c31ed1cec25deda2
SHA51243fb1b61b90326afe4cc79a78914228d759b37964d1fbd98ea8b6e45ad4ad95672c3eff38b70ea1e9718d0437f81e53454709f9a3d498df9bd96dd5b768b7969