Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
526bd7baed80f2625b713962bb62dc17.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
526bd7baed80f2625b713962bb62dc17.exe
Resource
win10v2004-20231222-en
General
-
Target
526bd7baed80f2625b713962bb62dc17.exe
-
Size
1.9MB
-
MD5
526bd7baed80f2625b713962bb62dc17
-
SHA1
fe24c566bf3e56562eb154ba1823c585d080c6e5
-
SHA256
b1cd246e002ea3c833eb58607d01acea038a0d5ff9a636cb93e54bddb132793b
-
SHA512
f4e4286f2869bbe95aa4d975876cd64ad2d633470674d3ce00b5162025c514ab03eaddaf01ef3393f6099ba6006455339be63e0be2c60d777e295f175f2768b7
-
SSDEEP
49152:Qoa1taC070dtGdk7B25q414IxLihTq7cVcqLlZX:Qoa1taC0UG9qPEiI4V9Zh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3020 7B19.tmp -
Executes dropped EXE 1 IoCs
pid Process 3020 7B19.tmp -
Loads dropped DLL 1 IoCs
pid Process 1960 526bd7baed80f2625b713962bb62dc17.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 3020 1960 526bd7baed80f2625b713962bb62dc17.exe 27 PID 1960 wrote to memory of 3020 1960 526bd7baed80f2625b713962bb62dc17.exe 27 PID 1960 wrote to memory of 3020 1960 526bd7baed80f2625b713962bb62dc17.exe 27 PID 1960 wrote to memory of 3020 1960 526bd7baed80f2625b713962bb62dc17.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\526bd7baed80f2625b713962bb62dc17.exe"C:\Users\Admin\AppData\Local\Temp\526bd7baed80f2625b713962bb62dc17.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\7B19.tmp"C:\Users\Admin\AppData\Local\Temp\7B19.tmp" --splashC:\Users\Admin\AppData\Local\Temp\526bd7baed80f2625b713962bb62dc17.exe 088E67D57424C51D54F03D95C35C56B06226DA9FC43E00B0D27D0C49B6E67FFF538C0293AA02F0ED1C9C43CA2E4C7698FFCEAE352434F379C984EF81CF9C37ED2⤵
- Deletes itself
- Executes dropped EXE
PID:3020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD57d0ca4125027c6d72dcab7eff2b91416
SHA1bb297d2e3471a682a62396d7400004b194694805
SHA256a4e243426b9c664593f0fe35dd460e1ec573740fab13780e04e8eb4df8d9fade
SHA5120203394b4549712b1830ed401de601220df8d7b03a045675d6aa9c1d5358b841398a7d5786a37b118f86924ad391063b4a2d724bfe4253d5499318ca415d4679
-
Filesize
1.2MB
MD526b124ca04227602c1780a2365c206f6
SHA1ba9bd69913910a98ada7c3aba9254a52a4e44756
SHA256b15ec6ca9b0d13203f61c2be1a6a562c43c182741f9bd40b3899dd425cd9131f
SHA51238b777810439e72b6b082a50acae036478764889da2ccbd980aba9083d00fac2d898e19ddbc5939df3cb8c5a00d3cdcde11a8d864beb22c554fb38ed39a716d4