Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 17:48
Behavioral task
behavioral1
Sample
49a6fb26582ede0ade82e0b9f7714989.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49a6fb26582ede0ade82e0b9f7714989.exe
Resource
win10v2004-20231215-en
General
-
Target
49a6fb26582ede0ade82e0b9f7714989.exe
-
Size
56KB
-
MD5
49a6fb26582ede0ade82e0b9f7714989
-
SHA1
33a21b04eeadced2ca5b8a869b5a85091053cb83
-
SHA256
4b8a0c570746e57ed21195bc66353acf1740ad727dd5587309465ebaab79f7d5
-
SHA512
d26d96981f3feecff2665ccc928a5b08941d257f949c5e0950033dc047eedbb580905dbfe320c67af035e62e028fd3425460988aff3124c4fd8ea0b2e06c6614
-
SSDEEP
1536:ECnurieBzwDfkHWjFApNESnfbptwXf+qXKaE:EvHww2jmlfbptwX11E
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2724 49a6fb26582ede0ade82e0b9f7714989.exe -
Executes dropped EXE 1 IoCs
pid Process 2724 49a6fb26582ede0ade82e0b9f7714989.exe -
Loads dropped DLL 1 IoCs
pid Process 1112 49a6fb26582ede0ade82e0b9f7714989.exe -
resource yara_rule behavioral1/memory/1112-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x0008000000012256-10.dat upx behavioral1/memory/2724-17-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1112 49a6fb26582ede0ade82e0b9f7714989.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1112 49a6fb26582ede0ade82e0b9f7714989.exe 2724 49a6fb26582ede0ade82e0b9f7714989.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1112 wrote to memory of 2724 1112 49a6fb26582ede0ade82e0b9f7714989.exe 28 PID 1112 wrote to memory of 2724 1112 49a6fb26582ede0ade82e0b9f7714989.exe 28 PID 1112 wrote to memory of 2724 1112 49a6fb26582ede0ade82e0b9f7714989.exe 28 PID 1112 wrote to memory of 2724 1112 49a6fb26582ede0ade82e0b9f7714989.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\49a6fb26582ede0ade82e0b9f7714989.exe"C:\Users\Admin\AppData\Local\Temp\49a6fb26582ede0ade82e0b9f7714989.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\49a6fb26582ede0ade82e0b9f7714989.exeC:\Users\Admin\AppData\Local\Temp\49a6fb26582ede0ade82e0b9f7714989.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2724
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD56d3a5ff49f1de963ceef924b8a9f578e
SHA1279bdeb5a371203a544fd4de66b9cb454674545d
SHA256ea8447cd0c89dae706157e25c30344e75971e57cb00a404bc6547ec6315c5b7c
SHA51263b717292c451f16e9eb51bbdbbc909870d160c7dfbeeeaf9ae7104725cbade486d7fb3de39a57d12903cfbe06fc612de0b8489b65ac372042ec42b0088e406d