Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
178s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 02:22
Static task
static1
Behavioral task
behavioral1
Sample
4f5349bfb263a3eaebb659ef6c85d903.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f5349bfb263a3eaebb659ef6c85d903.exe
Resource
win10v2004-20231215-en
General
-
Target
4f5349bfb263a3eaebb659ef6c85d903.exe
-
Size
1.6MB
-
MD5
4f5349bfb263a3eaebb659ef6c85d903
-
SHA1
c98dfe4f390fe9c130c9fc40e13c9a7875b5fd91
-
SHA256
8ac969299d7adcf5c8bf4f55938e632efce8cf99c1128eb73de16b838ba0d327
-
SHA512
16644b1bc78603c345e2db76f0b8347b8ab515c40230f54d877502e6235bab8e2fbd2e878bafc85442326b557787cc0e565b7c0608a8ea2b97f6726154d5db51
-
SSDEEP
49152:ApQTrKjXWVyj3lDgEeku52GyEyV7El/WyQ7U426tMc:Apkruj3JgEekuly7El/fQY42O
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2480 4f5349bfb263a3eaebb659ef6c85d903.exe -
Executes dropped EXE 1 IoCs
pid Process 2480 4f5349bfb263a3eaebb659ef6c85d903.exe -
Loads dropped DLL 1 IoCs
pid Process 2168 4f5349bfb263a3eaebb659ef6c85d903.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2168 4f5349bfb263a3eaebb659ef6c85d903.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2168 4f5349bfb263a3eaebb659ef6c85d903.exe 2480 4f5349bfb263a3eaebb659ef6c85d903.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2480 2168 4f5349bfb263a3eaebb659ef6c85d903.exe 29 PID 2168 wrote to memory of 2480 2168 4f5349bfb263a3eaebb659ef6c85d903.exe 29 PID 2168 wrote to memory of 2480 2168 4f5349bfb263a3eaebb659ef6c85d903.exe 29 PID 2168 wrote to memory of 2480 2168 4f5349bfb263a3eaebb659ef6c85d903.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f5349bfb263a3eaebb659ef6c85d903.exe"C:\Users\Admin\AppData\Local\Temp\4f5349bfb263a3eaebb659ef6c85d903.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\4f5349bfb263a3eaebb659ef6c85d903.exeC:\Users\Admin\AppData\Local\Temp\4f5349bfb263a3eaebb659ef6c85d903.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2480
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5d0d9c539488ff012051c256e7efe21b8
SHA12f7101020d86c60e3aebbb8aa928e9f1c68b9f29
SHA2562623f08ee678c4ed22e68bf3db08188d85280abda1789ef0e9a4f3b7ac1f3d31
SHA512820c2db3cc6ab3c5cad868997db2904bfc6b6a13cf791a5df6889be9167a33ce6d4eb86a0eb71c502025568fef242e1ba91c6266a2b74870920567ecf09a0aec
-
Filesize
132KB
MD5108b04cf50e79d5408246048fe6ff7de
SHA1cd59f3669a8de35ed16037bf32e165b9d9b2668c
SHA2565920769c76270189b32b3c818822931ae38ea80382f2ee451b2bb5c2b997d52c
SHA512d0ac36d989838248a02e1d67f903f52916da8f260734dd86d1a6915e7c3d3bc47887004226feb916445c96ee6c9b85b98190068ab6268ffef7af4ffa6c23405d