Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
5a781436cb8081307e4ace32a59e3d2c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5a781436cb8081307e4ace32a59e3d2c.exe
Resource
win10v2004-20231215-en
General
-
Target
5a781436cb8081307e4ace32a59e3d2c.exe
-
Size
84KB
-
MD5
5a781436cb8081307e4ace32a59e3d2c
-
SHA1
005b114c1ee2f232c5ec24d0d22286d1a7dade64
-
SHA256
2acdad3a4ccf58685bc404c5e634f756c0b10e59e3c3c369fe012ba471557292
-
SHA512
9f581309afe87c2e68fa00fa9558db557dc508a70964c74e9e3d40b4e18575f5654f496f93176e9be5293101c199edf11bb10709ca3c7b3b8594827943e5586d
-
SSDEEP
1536:zlPsb83uv8Poa9hOXbg0kyG7xXlaxZuyntizg3Uusr0418yDNUTi81fPU:zlPso3uEPrOjm1XlYtTrgBKmmc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2416 5a781436cb8081307e4ace32a59e3d2c.exe -
Executes dropped EXE 1 IoCs
pid Process 2416 5a781436cb8081307e4ace32a59e3d2c.exe -
Loads dropped DLL 1 IoCs
pid Process 2200 5a781436cb8081307e4ace32a59e3d2c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2200 5a781436cb8081307e4ace32a59e3d2c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2200 5a781436cb8081307e4ace32a59e3d2c.exe 2416 5a781436cb8081307e4ace32a59e3d2c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2416 2200 5a781436cb8081307e4ace32a59e3d2c.exe 20 PID 2200 wrote to memory of 2416 2200 5a781436cb8081307e4ace32a59e3d2c.exe 20 PID 2200 wrote to memory of 2416 2200 5a781436cb8081307e4ace32a59e3d2c.exe 20 PID 2200 wrote to memory of 2416 2200 5a781436cb8081307e4ace32a59e3d2c.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a781436cb8081307e4ace32a59e3d2c.exe"C:\Users\Admin\AppData\Local\Temp\5a781436cb8081307e4ace32a59e3d2c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\5a781436cb8081307e4ace32a59e3d2c.exeC:\Users\Admin\AppData\Local\Temp\5a781436cb8081307e4ace32a59e3d2c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2416
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD576e698aebcd7c08f8069a26465e97584
SHA1d7b940dffbc8b42e34f0a9eaae7a33133a9c07f4
SHA2567f7698ac04fe54a6d5aec2cf2d810841b171343fe251518a410e62c26e841d84
SHA5126c3ab4262a835263f125d4cff7f94715157e1fe74dd3dfca43e9ef58ee0bc1cf1ecebe26160c09179b60da8a8b9931f8e20bca7297453b8513afadebf751553e