Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
52c974090349a27ab4d00f661fd3d1f1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
52c974090349a27ab4d00f661fd3d1f1.exe
Resource
win10v2004-20231222-en
General
-
Target
52c974090349a27ab4d00f661fd3d1f1.exe
-
Size
4.5MB
-
MD5
52c974090349a27ab4d00f661fd3d1f1
-
SHA1
db4161521b3fd6c4672ada8ac94be47c987a1e26
-
SHA256
4f5e5e515d01b7136242dc0eb387c71bba75042380708e99e2be7c3666562668
-
SHA512
7fa12e2bd2b725df3dae3be3bfb8b2d2817dd3c3fc51f49fb4ef86947e761b41e8442e2036dd97890ba1157a03c88171da8ae64d6cbb461488009f407988e3ae
-
SSDEEP
98304:UkGEJ72NGT5qI+/pGmduT7ganjhEmpuXbpUEzGUdFZqE:pXJ72wn+9ufnjHpWpUEzB
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2840 setup.exe 2784 setup.exe -
Loads dropped DLL 8 IoCs
pid Process 2360 52c974090349a27ab4d00f661fd3d1f1.exe 2840 setup.exe 2840 setup.exe 2840 setup.exe 2840 setup.exe 2784 setup.exe 2784 setup.exe 2784 setup.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2840 2360 52c974090349a27ab4d00f661fd3d1f1.exe 28 PID 2360 wrote to memory of 2840 2360 52c974090349a27ab4d00f661fd3d1f1.exe 28 PID 2360 wrote to memory of 2840 2360 52c974090349a27ab4d00f661fd3d1f1.exe 28 PID 2360 wrote to memory of 2840 2360 52c974090349a27ab4d00f661fd3d1f1.exe 28 PID 2360 wrote to memory of 2840 2360 52c974090349a27ab4d00f661fd3d1f1.exe 28 PID 2360 wrote to memory of 2840 2360 52c974090349a27ab4d00f661fd3d1f1.exe 28 PID 2360 wrote to memory of 2840 2360 52c974090349a27ab4d00f661fd3d1f1.exe 28 PID 2840 wrote to memory of 2784 2840 setup.exe 29 PID 2840 wrote to memory of 2784 2840 setup.exe 29 PID 2840 wrote to memory of 2784 2840 setup.exe 29 PID 2840 wrote to memory of 2784 2840 setup.exe 29 PID 2840 wrote to memory of 2784 2840 setup.exe 29 PID 2840 wrote to memory of 2784 2840 setup.exe 29 PID 2840 wrote to memory of 2784 2840 setup.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\52c974090349a27ab4d00f661fd3d1f1.exe"C:\Users\Admin\AppData\Local\Temp\52c974090349a27ab4d00f661fd3d1f1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\_sb816.dir\setup.exeC:\Users\Admin\AppData\Local\Temp\_sb816.dir\setup.exe /f /sourcepath "C:\Users\Admin\AppData\Local\Temp\"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\_sb322.dir\setup.exeC:\Users\Admin\AppData\Local\Temp\_sb322.dir\setup.exe "C:\Users\Admin\AppData\Local\Temp\_sb816.dir\" /sourcepath "C:\Users\Admin\AppData\Local\Temp\_sb816.dir\" /SelLan 0409 "CheckId:SetupBuilder Professional 1.5.0001"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2784
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD59822d972a91b84cb5362abe0483cfa40
SHA19310d2641f4af22a5c6760b0442525500ad02daf
SHA25676f6f34a0928f09f933419e8d6913db7022d061ee24f9bfcad1fe5b93b37c3b3
SHA5122b1f82f9ea283bc9d0180a8b739635a56d10f177a9d60cb88a183774c6fce12916b18f1e6baa646cab24496ee12124629b0a2d40cb1e04b256a58e0ea81ce03b
-
Filesize
27KB
MD576e2a6a5e785ad50f5c2f23940e641be
SHA16ed519ac2aaecca7e65e853b0f4dd725b224f8b7
SHA2567615535056d47fd0e575856baf8869126b0f066fcb05c77eb820c100e7746605
SHA51254e5bd64b6faa5254f55f5c529c8b05169410fbd51a07a6bef3f5b85f69cc2547774e4634745aab18a80640a429d90adbcf9abf0673bc0cedae6e645d082d438
-
Filesize
265KB
MD579daaa133ff4a1c9a0e3e13ec2a743a3
SHA1917f8c4066d2a816fa1c1b69359917322d3c8f73
SHA256671b6d307e079d4ddc323a04399e3f9e6c9cd3f53683d93bb8dac22a907a2a5c
SHA51299680cdf3e618ce443952acfb6f749e2f083677d3b63794baf4ea2f197ee992c69fc794c99df6e155517a905d55920ed8376c2b9bf2aa2790b9b7ccb9d5c1e45
-
Filesize
935B
MD50063c8eb36380f7eeec297c1860b5913
SHA1bbbce27ecbeb096f92db2708e52e8fbf81340a82
SHA256d942667ebb16e6d54dfd0787ac7d65e99e992e5f69e8767f6cf76ca22384ec9f
SHA5126164e7dee7deb9afc610025d7c7d4cac6aaa2691ad4deaffe0a24f4ddc377a8eb0339450659ae31d82618472e77fe35005ac026db14899deb4b89f989b28d4d5
-
Filesize
245KB
MD56a4179b0e3815cb78ac459826b9fc54e
SHA132f7dc191292c1731515e99f629bb192e3f64d71
SHA25605dafe711e71980e1170c455ecc327bc2ab5626be3beb879c56231c0cb2dd83f
SHA512efc665055a3caadc0b98e90d6e64acfa2509829d1b0729266ccf2adecc54863d2abb8d31792c582b527d9048e649910665ff37ccc2c8fda15fe7459dd152c164
-
Filesize
154KB
MD594dbe0e05db59d56c743f87d58184cf2
SHA1eeccac06d5125384403b79b62e8ad0b796cdf8e0
SHA256a3a0d80a90794b30f58390c8fc91f3f2990a675cab6661ad9816a02bb3bb39cb
SHA512029f7a6adcfdecd9aa75844a00129d8a3fe7a3706aa5329d762730287e4b0dccff7b636c63dec5cdfab6a2bd811b05b94f399c31cf7b5ff3ecb67f2fdb7984c5