Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 03:33

General

  • Target

    526bd7baed80f2625b713962bb62dc17.exe

  • Size

    1.9MB

  • MD5

    526bd7baed80f2625b713962bb62dc17

  • SHA1

    fe24c566bf3e56562eb154ba1823c585d080c6e5

  • SHA256

    b1cd246e002ea3c833eb58607d01acea038a0d5ff9a636cb93e54bddb132793b

  • SHA512

    f4e4286f2869bbe95aa4d975876cd64ad2d633470674d3ce00b5162025c514ab03eaddaf01ef3393f6099ba6006455339be63e0be2c60d777e295f175f2768b7

  • SSDEEP

    49152:Qoa1taC070dtGdk7B25q414IxLihTq7cVcqLlZX:Qoa1taC0UG9qPEiI4V9Zh

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\526bd7baed80f2625b713962bb62dc17.exe
    "C:\Users\Admin\AppData\Local\Temp\526bd7baed80f2625b713962bb62dc17.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Local\Temp\7B19.tmp
      "C:\Users\Admin\AppData\Local\Temp\7B19.tmp" --splashC:\Users\Admin\AppData\Local\Temp\526bd7baed80f2625b713962bb62dc17.exe 088E67D57424C51D54F03D95C35C56B06226DA9FC43E00B0D27D0C49B6E67FFF538C0293AA02F0ED1C9C43CA2E4C7698FFCEAE352434F379C984EF81CF9C37ED
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3020

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7B19.tmp

    Filesize

    81KB

    MD5

    7d0ca4125027c6d72dcab7eff2b91416

    SHA1

    bb297d2e3471a682a62396d7400004b194694805

    SHA256

    a4e243426b9c664593f0fe35dd460e1ec573740fab13780e04e8eb4df8d9fade

    SHA512

    0203394b4549712b1830ed401de601220df8d7b03a045675d6aa9c1d5358b841398a7d5786a37b118f86924ad391063b4a2d724bfe4253d5499318ca415d4679

  • \Users\Admin\AppData\Local\Temp\7B19.tmp

    Filesize

    1.2MB

    MD5

    26b124ca04227602c1780a2365c206f6

    SHA1

    ba9bd69913910a98ada7c3aba9254a52a4e44756

    SHA256

    b15ec6ca9b0d13203f61c2be1a6a562c43c182741f9bd40b3899dd425cd9131f

    SHA512

    38b777810439e72b6b082a50acae036478764889da2ccbd980aba9083d00fac2d898e19ddbc5939df3cb8c5a00d3cdcde11a8d864beb22c554fb38ed39a716d4

  • memory/1960-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/3020-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB