Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 06:06
Static task
static1
Behavioral task
behavioral1
Sample
5a79d0380189c8296219eab03d16b21f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a79d0380189c8296219eab03d16b21f.exe
Resource
win10v2004-20231222-en
General
-
Target
5a79d0380189c8296219eab03d16b21f.exe
-
Size
48KB
-
MD5
5a79d0380189c8296219eab03d16b21f
-
SHA1
6b9d3cd773aba8a68e9d0a8442994c6fa6a10ffd
-
SHA256
c476e398c5e77086a5b73fe67a95e4cd271d7e0f33da1bdba0fd0058e74ee82b
-
SHA512
8fb0cfa96315d6970471e4b1c88c488d7e9819288a99f190fa1d35366df1ae5da742836e8123f2f13c8493dc2a5c3b3b4718b6766e44136a8410c69222c3572e
-
SSDEEP
768:Uw/P9t01936rvuosdtvWgDcc3mkqbzID2Z+85DOWDOleX/dyIpAACe8A8w:z9Cn36rvuZzvWgDVqhMcTvdlpP8/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2892 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1900 gfslwbwn.exe -
Loads dropped DLL 2 IoCs
pid Process 2504 5a79d0380189c8296219eab03d16b21f.exe 2504 5a79d0380189c8296219eab03d16b21f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2504 5a79d0380189c8296219eab03d16b21f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1900 2504 5a79d0380189c8296219eab03d16b21f.exe 31 PID 2504 wrote to memory of 1900 2504 5a79d0380189c8296219eab03d16b21f.exe 31 PID 2504 wrote to memory of 1900 2504 5a79d0380189c8296219eab03d16b21f.exe 31 PID 2504 wrote to memory of 1900 2504 5a79d0380189c8296219eab03d16b21f.exe 31 PID 2504 wrote to memory of 2892 2504 5a79d0380189c8296219eab03d16b21f.exe 33 PID 2504 wrote to memory of 2892 2504 5a79d0380189c8296219eab03d16b21f.exe 33 PID 2504 wrote to memory of 2892 2504 5a79d0380189c8296219eab03d16b21f.exe 33 PID 2504 wrote to memory of 2892 2504 5a79d0380189c8296219eab03d16b21f.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a79d0380189c8296219eab03d16b21f.exe"C:\Users\Admin\AppData\Local\Temp\5a79d0380189c8296219eab03d16b21f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\ProgramData\odgrsxsz\gfslwbwn.exeC:\ProgramData\odgrsxsz\gfslwbwn.exe2⤵
- Executes dropped EXE
PID:1900
-
-
C:\Windows\SysWOW64\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\5A79D0~1.EXE.bak >> NUL2⤵
- Deletes itself
PID:2892
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD55a79d0380189c8296219eab03d16b21f
SHA16b9d3cd773aba8a68e9d0a8442994c6fa6a10ffd
SHA256c476e398c5e77086a5b73fe67a95e4cd271d7e0f33da1bdba0fd0058e74ee82b
SHA5128fb0cfa96315d6970471e4b1c88c488d7e9819288a99f190fa1d35366df1ae5da742836e8123f2f13c8493dc2a5c3b3b4718b6766e44136a8410c69222c3572e