Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/01/2024, 06:21

General

  • Target

    66eb36eb522d0d75a375f25137fedcd3.exe

  • Size

    319KB

  • MD5

    66eb36eb522d0d75a375f25137fedcd3

  • SHA1

    c9a88a612cdd40527d86bf396d68d406c0c1593a

  • SHA256

    dd7c2ec5a657d609110efb6d00af2febcfc528b7c733493cfa90a8ac8760c9a8

  • SHA512

    dbdc499b8d3b4d1046a33fb89b8b73f1998dd3b20b07f16b6fb0159b837d410d1914b2b116c07516fbe4ff794230b7c440015384c8802a69bee9c5fbc09fd40a

  • SSDEEP

    1536:ZQvBHZgFLJzSLWTVNyO5BMD8DXiDSkvHF5OauCCVmgleSe+eooOoaoCoCo0oBoF1:8hZgFLGSNyO5Bnso

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\SysWOW64\wscript.exe
    /nologo C:\WINDOWS\zxcv.vbs
    1⤵
      PID:1968
    • C:\Users\Admin\AppData\Local\Temp\66eb36eb522d0d75a375f25137fedcd3.exe
      "C:\Users\Admin\AppData\Local\Temp\66eb36eb522d0d75a375f25137fedcd3.exe"
      1⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Users\Admin\AppData\Local\Temp\Del73D9.tmp
        C:\Users\Admin\AppData\Local\Temp\Del73D9.tmp 156 "C:\Users\Admin\AppData\Local\Temp\66eb36eb522d0d75a375f25137fedcd3.exe"
        2⤵
        • Deletes itself
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2336
        • C:\Windows\SysWOW64\wscript.exe
          /nologo C:\WINDOWS\zxcv.vbs
          3⤵
            PID:2376

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Del73D9.tmp

        Filesize

        319KB

        MD5

        66eb36eb522d0d75a375f25137fedcd3

        SHA1

        c9a88a612cdd40527d86bf396d68d406c0c1593a

        SHA256

        dd7c2ec5a657d609110efb6d00af2febcfc528b7c733493cfa90a8ac8760c9a8

        SHA512

        dbdc499b8d3b4d1046a33fb89b8b73f1998dd3b20b07f16b6fb0159b837d410d1914b2b116c07516fbe4ff794230b7c440015384c8802a69bee9c5fbc09fd40a

      • C:\WINDOWS\zxcv.vbs

        Filesize

        262KB

        MD5

        6eb497ff0c637387f3afc721c6e08f2c

        SHA1

        308a5b00a1012ca932b544362018427e318e940d

        SHA256

        bcbbdcaae49d005d07d98ff11702391427a7d7848fd0843a256216d9dce57def

        SHA512

        844b07d97a73ffc246a2fb74f9d7cca9e61b669f79c78c12e1751e09efdabb69071e2bbd99caae1035b6ad588d4478f73dd204bfe9b209d4fdaf61ffd65066e8