Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
645f4ad4daa596e2dcf1216c43beb2dd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
645f4ad4daa596e2dcf1216c43beb2dd.exe
Resource
win10v2004-20231215-en
General
-
Target
645f4ad4daa596e2dcf1216c43beb2dd.exe
-
Size
57KB
-
MD5
645f4ad4daa596e2dcf1216c43beb2dd
-
SHA1
ff707f8ad3968777f9f2af8f7755f93fe6c64918
-
SHA256
ebaa77ffec5274e94382118aaa95b3f2b26a38d73e629201d5d2757e839d6d71
-
SHA512
5d99b5bee36d202bce64814ce751b17624ac4d4a2b7f3b4329c6293729a959588046fc6ea3e2face916fa18b3ba773f551d29fa31168ca48fbd1a2f5d50f5e9b
-
SSDEEP
768:vAG3lS3K5F5T0+Z0ZG7NHK0Venu59vnhwyh36nESKbkCz/JgZwCaCgslV5Gi0JdG:vzksTzUlneHxyEFkCz/J8wuGj3+t3Z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 844 645f4ad4daa596e2dcf1216c43beb2dd.exe -
Executes dropped EXE 1 IoCs
pid Process 844 645f4ad4daa596e2dcf1216c43beb2dd.exe -
Loads dropped DLL 1 IoCs
pid Process 2424 645f4ad4daa596e2dcf1216c43beb2dd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2424 645f4ad4daa596e2dcf1216c43beb2dd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2424 645f4ad4daa596e2dcf1216c43beb2dd.exe 844 645f4ad4daa596e2dcf1216c43beb2dd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 844 2424 645f4ad4daa596e2dcf1216c43beb2dd.exe 29 PID 2424 wrote to memory of 844 2424 645f4ad4daa596e2dcf1216c43beb2dd.exe 29 PID 2424 wrote to memory of 844 2424 645f4ad4daa596e2dcf1216c43beb2dd.exe 29 PID 2424 wrote to memory of 844 2424 645f4ad4daa596e2dcf1216c43beb2dd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\645f4ad4daa596e2dcf1216c43beb2dd.exe"C:\Users\Admin\AppData\Local\Temp\645f4ad4daa596e2dcf1216c43beb2dd.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\645f4ad4daa596e2dcf1216c43beb2dd.exeC:\Users\Admin\AppData\Local\Temp\645f4ad4daa596e2dcf1216c43beb2dd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:844
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD574c8f5b9e6e363feb07866641ce7caa9
SHA10dc855de65e790188e1801778194774935d0d1c5
SHA256ff0df9b824f5c21d681f10d1c09ee3a457d51c8c66ec8bee0f50b259f940f551
SHA5129112b7e923db8fe3d43a633e46e1b5ef2bbb2c9d65ab1fb41c3a922f5a38a53d8225dcbd6cdfc6a66f791f4ab59bdeef694e6eb3d76a555329bbbcecbd095257