Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 16:47
Static task
static1
Behavioral task
behavioral1
Sample
6822a845a256fb94337e2f1273d0fc28.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6822a845a256fb94337e2f1273d0fc28.exe
Resource
win10v2004-20231215-en
General
-
Target
6822a845a256fb94337e2f1273d0fc28.exe
-
Size
82KB
-
MD5
6822a845a256fb94337e2f1273d0fc28
-
SHA1
2b6c7390798b2e12ecac919b138c6cc46aa9bb2e
-
SHA256
b4d125e44c6a5d8216f0375f749f261bdc031ded9a8b396dcb6f61729b51e33a
-
SHA512
5607f8e0f8ff75bcf1e968d25f72a15ee030811a641a14dcbdb68a8ee640f2938675d4a52759e2fe84102f40b702a102487cf52ec41085da400af48e0c5fc62d
-
SSDEEP
1536:mVZEQZT1U7lr+FJoIA/XQ7Xgx4Pg2RAWmqfL8xeg+Ane1EUzbv0S0EA5OEcMp:mVZE6T1UpgKIxXgx4PgyAG1gAtzbv0SG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2912 6822a845a256fb94337e2f1273d0fc28.exe -
Executes dropped EXE 1 IoCs
pid Process 2912 6822a845a256fb94337e2f1273d0fc28.exe -
Loads dropped DLL 1 IoCs
pid Process 2140 6822a845a256fb94337e2f1273d0fc28.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2140 6822a845a256fb94337e2f1273d0fc28.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2140 6822a845a256fb94337e2f1273d0fc28.exe 2912 6822a845a256fb94337e2f1273d0fc28.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2912 2140 6822a845a256fb94337e2f1273d0fc28.exe 29 PID 2140 wrote to memory of 2912 2140 6822a845a256fb94337e2f1273d0fc28.exe 29 PID 2140 wrote to memory of 2912 2140 6822a845a256fb94337e2f1273d0fc28.exe 29 PID 2140 wrote to memory of 2912 2140 6822a845a256fb94337e2f1273d0fc28.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6822a845a256fb94337e2f1273d0fc28.exe"C:\Users\Admin\AppData\Local\Temp\6822a845a256fb94337e2f1273d0fc28.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\6822a845a256fb94337e2f1273d0fc28.exeC:\Users\Admin\AppData\Local\Temp\6822a845a256fb94337e2f1273d0fc28.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2912
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5cf59acd3276f87ffb7616a9209834bf1
SHA1d4a2fabb26307e03a604b7f3f566ef76fe8787e0
SHA2560cd900a1e93e67fabe1cb970837b56d8cb787c6503e65bed0f2a869abc5ab7cc
SHA5126cdd71a9dc666d5ace65ded4eca23e525b1890b474da96a1ad6bf5ffcd54db75d499394784f4d57bda2bb61fd03375eac0c4911c4ce5fc02d15c4e9c2248eed1