Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 14:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4e88c829ebb1afa4cda7ac3c978d0d07.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
4e88c829ebb1afa4cda7ac3c978d0d07.exe
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
4e88c829ebb1afa4cda7ac3c978d0d07.exe
-
Size
330KB
-
MD5
4e88c829ebb1afa4cda7ac3c978d0d07
-
SHA1
d4c28a608ed7eb55d9e10a6041ab563f9f0e53a7
-
SHA256
946dd8914bcbb40722a04d4c04dd314bb837f63164699e07ab977be181abde20
-
SHA512
b708cf6ed8833611aec48a704148949d99bc3bff9c96ed8d69aa7af2a7882e621b4c500fc61c58aa3a37a7fe357eecb745d042c5586449c4717ece4350947dac
-
SSDEEP
6144:yiWVDiFh7O/lKNi5HDneTSI5la+9sn+X6/IGC94OP8W5HDneTSI5la+9sn2:lWVDiFh7OR5SmyxX6bC/5SmyJ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1460 4e88c829ebb1afa4cda7ac3c978d0d07.exe -
Executes dropped EXE 1 IoCs
pid Process 1460 4e88c829ebb1afa4cda7ac3c978d0d07.exe -
Loads dropped DLL 1 IoCs
pid Process 2652 4e88c829ebb1afa4cda7ac3c978d0d07.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2652 4e88c829ebb1afa4cda7ac3c978d0d07.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2652 4e88c829ebb1afa4cda7ac3c978d0d07.exe 1460 4e88c829ebb1afa4cda7ac3c978d0d07.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1460 2652 4e88c829ebb1afa4cda7ac3c978d0d07.exe 16 PID 2652 wrote to memory of 1460 2652 4e88c829ebb1afa4cda7ac3c978d0d07.exe 16 PID 2652 wrote to memory of 1460 2652 4e88c829ebb1afa4cda7ac3c978d0d07.exe 16 PID 2652 wrote to memory of 1460 2652 4e88c829ebb1afa4cda7ac3c978d0d07.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e88c829ebb1afa4cda7ac3c978d0d07.exe"C:\Users\Admin\AppData\Local\Temp\4e88c829ebb1afa4cda7ac3c978d0d07.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\4e88c829ebb1afa4cda7ac3c978d0d07.exeC:\Users\Admin\AppData\Local\Temp\4e88c829ebb1afa4cda7ac3c978d0d07.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1460
-