Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 16:55
Static task
static1
Behavioral task
behavioral1
Sample
593bae6057ccc612f059d4650d951716.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
593bae6057ccc612f059d4650d951716.exe
Resource
win10v2004-20231222-en
General
-
Target
593bae6057ccc612f059d4650d951716.exe
-
Size
82KB
-
MD5
593bae6057ccc612f059d4650d951716
-
SHA1
0601674dc3768bd67ffae5494ab399413666d4af
-
SHA256
df74904d5d977bcac85aa9f1635913345774b9e6c708ae6ba405d638d1b11fef
-
SHA512
72e12abe8318a06a2d7eee7d2f243e9b54d8310ad6cd2029156179cae7362aea992adbc95722c923ecca107159fde85347d46459810364bb603d0aab23bfea02
-
SSDEEP
1536:7DHA8wKYPytS/h7tIVs2C+K25KsCO54K4+3zqtVcbfymL8WzKmZSb/y:7D7q1RtIVsF3TONCV6XIWzKmUba
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2220 593bae6057ccc612f059d4650d951716.exe -
Executes dropped EXE 1 IoCs
pid Process 2220 593bae6057ccc612f059d4650d951716.exe -
Loads dropped DLL 1 IoCs
pid Process 1644 593bae6057ccc612f059d4650d951716.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1644 593bae6057ccc612f059d4650d951716.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1644 593bae6057ccc612f059d4650d951716.exe 2220 593bae6057ccc612f059d4650d951716.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2220 1644 593bae6057ccc612f059d4650d951716.exe 29 PID 1644 wrote to memory of 2220 1644 593bae6057ccc612f059d4650d951716.exe 29 PID 1644 wrote to memory of 2220 1644 593bae6057ccc612f059d4650d951716.exe 29 PID 1644 wrote to memory of 2220 1644 593bae6057ccc612f059d4650d951716.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\593bae6057ccc612f059d4650d951716.exe"C:\Users\Admin\AppData\Local\Temp\593bae6057ccc612f059d4650d951716.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\593bae6057ccc612f059d4650d951716.exeC:\Users\Admin\AppData\Local\Temp\593bae6057ccc612f059d4650d951716.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2220
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD503fe46d503e1cfbcec9b9c7fbc73d96d
SHA13cfcdb217757f5f56c617db6ffc727ecd101d24f
SHA2566e4fe5efc48849212bcff53a9870adf2a3153e0956335862f1c2bc5f36ee9baf
SHA512c5e4bf012f9ee73832d28bd6f2f2952ccce673e601e9f6b2bd06852355d2c49ed8865f7e125a7eb6dc756e83d5a6fa5351df9dc34934bdab321c890ef8c9ea5f