Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 11:24
Behavioral task
behavioral1
Sample
58cd52f895ae93a4024dd32a25482b10.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58cd52f895ae93a4024dd32a25482b10.exe
Resource
win10v2004-20231215-en
General
-
Target
58cd52f895ae93a4024dd32a25482b10.exe
-
Size
1.3MB
-
MD5
58cd52f895ae93a4024dd32a25482b10
-
SHA1
a9117f246defd963ddb6cbecfb75a5fc9e266094
-
SHA256
5d2d1e8d5268709daae6f1e88e9900256ddce9e58d6e3d7d7bda9e1b1aa7336f
-
SHA512
1c1a8b4588f15f37f121dec76bf3cfbe05cbbb3f9f5c7ee690cb64ab4ed20c85668b80cba39e65377327e7990aaad8bfd60a5ebd2bbf401b816614debb5c93c6
-
SSDEEP
24576:CMzfb5v+gwitwuMIYuMxbxYRztOMsJyz0ssADg2oVtMxIEigSUCJ7Wc:vw8HYuMxbUzWIDSixIFH1pp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2516 58cd52f895ae93a4024dd32a25482b10.exe -
Executes dropped EXE 1 IoCs
pid Process 2516 58cd52f895ae93a4024dd32a25482b10.exe -
Loads dropped DLL 1 IoCs
pid Process 1644 58cd52f895ae93a4024dd32a25482b10.exe -
resource yara_rule behavioral1/memory/1644-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000e000000012670-10.dat upx behavioral1/files/0x000e000000012670-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1644 58cd52f895ae93a4024dd32a25482b10.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1644 58cd52f895ae93a4024dd32a25482b10.exe 2516 58cd52f895ae93a4024dd32a25482b10.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2516 1644 58cd52f895ae93a4024dd32a25482b10.exe 28 PID 1644 wrote to memory of 2516 1644 58cd52f895ae93a4024dd32a25482b10.exe 28 PID 1644 wrote to memory of 2516 1644 58cd52f895ae93a4024dd32a25482b10.exe 28 PID 1644 wrote to memory of 2516 1644 58cd52f895ae93a4024dd32a25482b10.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\58cd52f895ae93a4024dd32a25482b10.exe"C:\Users\Admin\AppData\Local\Temp\58cd52f895ae93a4024dd32a25482b10.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\58cd52f895ae93a4024dd32a25482b10.exeC:\Users\Admin\AppData\Local\Temp\58cd52f895ae93a4024dd32a25482b10.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2516
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD5641b2c5574291b4b1044e60ef0cd7761
SHA1b5980b439fa427f1a5a7d5dd883cef7c7bd78c67
SHA2562751915bbf94423aacbb13916d1b4792dc896c6d1fef839c77d087e2a822d6d7
SHA5127ceb3f988019ae97051c54d980e3e0b2d38dbf7af1d104eb5dab3c3e809741417b31adeaa5a04e33531ed718fd3824a876e9f3d2fec5b822c261a2ff3e82ca7a
-
Filesize
647KB
MD53d7c7c694ca5d3d00242300cd0d2cd1c
SHA13335fa0d22cb18c457b2ef4f60527e03dfd5a9c7
SHA256a42cb39b2015ea1f30b27d6902586adc97225811d770eb658c139f3d325a5c34
SHA512cb3ddcfd6c185db01602b6929011003a2e7613ba984fbf215d14998937bc37591b028fe4a80871fe4028a2303a72c83b5a8b5dccd2710d93691202174beb573b