Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
705b94fc30bcc70f90a3219a40bf42ac.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
705b94fc30bcc70f90a3219a40bf42ac.exe
Resource
win10v2004-20231215-en
General
-
Target
705b94fc30bcc70f90a3219a40bf42ac.exe
-
Size
82KB
-
MD5
705b94fc30bcc70f90a3219a40bf42ac
-
SHA1
bed2d247695e92e1479a4832afa07d7aac58895a
-
SHA256
bd96cdeea8006cee78bf25e28c81bfacc3752d9c1074bee9d7cdc0fced691653
-
SHA512
5552b1c27e338279d2e2e5098e0deb59d5eb83e2b2262d52c85076871a9e80b77ab3159fa2372305719b40e7af6d899112adcd9edbacef2a9589d4e1cdb68384
-
SSDEEP
1536:EL9ySzAfZ1ciWscEecAUH+XWwzoHWSHulto1Retm9RLbFU2G6VciM:EpxzALpTiWicSLf49RHveB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2824 705b94fc30bcc70f90a3219a40bf42ac.exe -
Executes dropped EXE 1 IoCs
pid Process 2824 705b94fc30bcc70f90a3219a40bf42ac.exe -
Loads dropped DLL 1 IoCs
pid Process 2888 705b94fc30bcc70f90a3219a40bf42ac.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2888 705b94fc30bcc70f90a3219a40bf42ac.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2888 705b94fc30bcc70f90a3219a40bf42ac.exe 2824 705b94fc30bcc70f90a3219a40bf42ac.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2824 2888 705b94fc30bcc70f90a3219a40bf42ac.exe 29 PID 2888 wrote to memory of 2824 2888 705b94fc30bcc70f90a3219a40bf42ac.exe 29 PID 2888 wrote to memory of 2824 2888 705b94fc30bcc70f90a3219a40bf42ac.exe 29 PID 2888 wrote to memory of 2824 2888 705b94fc30bcc70f90a3219a40bf42ac.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\705b94fc30bcc70f90a3219a40bf42ac.exe"C:\Users\Admin\AppData\Local\Temp\705b94fc30bcc70f90a3219a40bf42ac.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\705b94fc30bcc70f90a3219a40bf42ac.exeC:\Users\Admin\AppData\Local\Temp\705b94fc30bcc70f90a3219a40bf42ac.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2824
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD50912aab3ab81787f097e2da5b007891c
SHA17492c1db357c92f1ab091b923a46943144acfe29
SHA2561416be947e0ba3e14e29378de8fedb9ffbcec404bec0b942798f3400ec64b05c
SHA512bafd20203bc14f5057b36928a1542becea354d9e18dc0135a5fc30b8ff297e548a68f084df2ce41dbe2ad3a17450bacaa35cc01070878d44d1bdb1bcceffe111