Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/01/2024, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
6fc2034a1083d6a850b2c4d0f5a2a0ed.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6fc2034a1083d6a850b2c4d0f5a2a0ed.exe
Resource
win10v2004-20231215-en
General
-
Target
6fc2034a1083d6a850b2c4d0f5a2a0ed.exe
-
Size
105KB
-
MD5
6fc2034a1083d6a850b2c4d0f5a2a0ed
-
SHA1
a3641420dd8be4207cc3a4c276d0dd9330960f3e
-
SHA256
4cc07a1b14f2b684291cb4dba3025e03e99e33c3160bfc35a5e8a273d6ec1d13
-
SHA512
a9afd1196049fb6ca542c59a4f54b56884ae4e46cd639fdb361104a0ccece097957a6e7f178cc00f9ebb0bac50472c8738e2652181b706c9339b06f14ccd0719
-
SSDEEP
1536:m+MCEWd57dyQojkjMaia35qGxb34xWZIT3EpkO60Kl6EZ6FL6Q2hiTt6DtW9YH:mJCf7dD8aLp1x4xl3Os0CF6FL6X1pW9i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2748 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe -
Executes dropped EXE 1 IoCs
pid Process 2748 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe -
Loads dropped DLL 1 IoCs
pid Process 2028 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2028 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2028 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe 2748 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2748 2028 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe 29 PID 2028 wrote to memory of 2748 2028 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe 29 PID 2028 wrote to memory of 2748 2028 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe 29 PID 2028 wrote to memory of 2748 2028 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fc2034a1083d6a850b2c4d0f5a2a0ed.exe"C:\Users\Admin\AppData\Local\Temp\6fc2034a1083d6a850b2c4d0f5a2a0ed.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\6fc2034a1083d6a850b2c4d0f5a2a0ed.exeC:\Users\Admin\AppData\Local\Temp\6fc2034a1083d6a850b2c4d0f5a2a0ed.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2748
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD535df3d4510db8ea9b14051f6355008ca
SHA11516fdfbafab4ea8328970cdb91f2b023a240d80
SHA256a9cb758abd41b276de9b54bb902342d44e04686043496b020d135b8d2150f9f7
SHA512e52c77c18820f329a755f134bcbb695f0034be200df139937fb3d66e259de7f4fcdb4e29e1fdff61aec0c40ec72557af6c04b3dfc052899e9069ad6dd8cce7c7