Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
509291e1cb255ecf7a29b66b61034598.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
509291e1cb255ecf7a29b66b61034598.exe
Resource
win10v2004-20231222-en
General
-
Target
509291e1cb255ecf7a29b66b61034598.exe
-
Size
84KB
-
MD5
509291e1cb255ecf7a29b66b61034598
-
SHA1
f178ce3792e6bba000f1ec6e4d77257f0456251b
-
SHA256
93c910c11377073a437b4827c732fdee0f693d0e14efdfe499b2bfe741ad846b
-
SHA512
14425890badacc762140c37f739bc2df7e541506b48afd044011e3f1aaee4b8f89588c301e2d2db3abd362a43c2caca5ac10893532ef131ca7922bb8df9284d0
-
SSDEEP
1536:FWQN7KN2kleuocsVrc4b3rahSLpBui8ubFvqonukPnspvO4:FWQUAuhsdcizLpBuDUvqTgnspm4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2044 509291e1cb255ecf7a29b66b61034598.exe -
Executes dropped EXE 1 IoCs
pid Process 2044 509291e1cb255ecf7a29b66b61034598.exe -
Loads dropped DLL 1 IoCs
pid Process 2108 509291e1cb255ecf7a29b66b61034598.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2108 509291e1cb255ecf7a29b66b61034598.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2108 509291e1cb255ecf7a29b66b61034598.exe 2044 509291e1cb255ecf7a29b66b61034598.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2044 2108 509291e1cb255ecf7a29b66b61034598.exe 29 PID 2108 wrote to memory of 2044 2108 509291e1cb255ecf7a29b66b61034598.exe 29 PID 2108 wrote to memory of 2044 2108 509291e1cb255ecf7a29b66b61034598.exe 29 PID 2108 wrote to memory of 2044 2108 509291e1cb255ecf7a29b66b61034598.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\509291e1cb255ecf7a29b66b61034598.exe"C:\Users\Admin\AppData\Local\Temp\509291e1cb255ecf7a29b66b61034598.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\509291e1cb255ecf7a29b66b61034598.exeC:\Users\Admin\AppData\Local\Temp\509291e1cb255ecf7a29b66b61034598.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2044
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5553712b043b498c095cda19e89152225
SHA1c1faff38d25ae80d5f5b888468a5d7d867f16eab
SHA256544b9113598bdc56cb6083fca09ddcf6635968a8ebba646fe7a94d937c6e2289
SHA5126f9b7a878dc8faca6e6e6d42dd377d6d324dce75df5d7ede1dcdad278b9e69938e4ee74f838fe0fdd54c4327c70f1721b65d0ff13e80e7acf0aa7f662c00767e