Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 05:37
Behavioral task
behavioral1
Sample
7196651d87a1a98e4e893ce551ea4a2d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7196651d87a1a98e4e893ce551ea4a2d.exe
Resource
win10v2004-20231215-en
General
-
Target
7196651d87a1a98e4e893ce551ea4a2d.exe
-
Size
1.5MB
-
MD5
7196651d87a1a98e4e893ce551ea4a2d
-
SHA1
92cb9a414fee5030da6491cf0931e10b2e995d92
-
SHA256
4dc3709422c33a80b51177693a7d6d15ea9b01cd37a3f4966677c5750f4a165d
-
SHA512
32d5b9d94c570ba11ca2702b9ca6094877a779655a822b28c79313ccfec4b768d813c3bb047ac1a9f26a6a325e9b2cb7d95d015d21ff018e5c2ff4584e626e98
-
SSDEEP
24576:/PYfWphKULAQfrpyyuQGWFVw9HWrAXsiVkfPgQr7Q9xzr/mq84pQW:zPKU8SXu7HdXsiagYUzzrxpQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1980 7196651d87a1a98e4e893ce551ea4a2d.exe -
Executes dropped EXE 1 IoCs
pid Process 1980 7196651d87a1a98e4e893ce551ea4a2d.exe -
Loads dropped DLL 1 IoCs
pid Process 2016 7196651d87a1a98e4e893ce551ea4a2d.exe -
resource yara_rule behavioral1/memory/2016-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000c000000012258-10.dat upx behavioral1/files/0x000c000000012258-12.dat upx behavioral1/memory/1980-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000c000000012258-15.dat upx behavioral1/memory/2016-14-0x0000000003800000-0x0000000003CEF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2016 7196651d87a1a98e4e893ce551ea4a2d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2016 7196651d87a1a98e4e893ce551ea4a2d.exe 1980 7196651d87a1a98e4e893ce551ea4a2d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1980 2016 7196651d87a1a98e4e893ce551ea4a2d.exe 28 PID 2016 wrote to memory of 1980 2016 7196651d87a1a98e4e893ce551ea4a2d.exe 28 PID 2016 wrote to memory of 1980 2016 7196651d87a1a98e4e893ce551ea4a2d.exe 28 PID 2016 wrote to memory of 1980 2016 7196651d87a1a98e4e893ce551ea4a2d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7196651d87a1a98e4e893ce551ea4a2d.exe"C:\Users\Admin\AppData\Local\Temp\7196651d87a1a98e4e893ce551ea4a2d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\7196651d87a1a98e4e893ce551ea4a2d.exeC:\Users\Admin\AppData\Local\Temp\7196651d87a1a98e4e893ce551ea4a2d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1980
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
469KB
MD579565d1edddbd7493535e513fc1247da
SHA1d79ca6d35a1e5a43ea5e18425a33dcf1c8f850c8
SHA256644a8290e9dae6314b5dae9312ddc225304f8552346815b4c04ec672ce560370
SHA512770a19c28a57e5f837da67aacd4f8a631916a46ff6665912cda71db6b0374a17511bcdb80ae031c50c4d1baa3294105db719045d46ec43ed31c99f91214c9bba
-
Filesize
721KB
MD5c86004b3feab2253189217234df310e0
SHA15daef579fc99b3b5294f1b6c1194de00dab9d4cd
SHA256c044af4afadcbe70f458f5b418af702ba84af4539b9ae7818f7def45799d3259
SHA512b34abb20eff56f6c3eb4001f34b205042e0912d3c67583b85896d5d553a1336c99f4865e418691608f2143d9e9762a79f93ca1b65b3648e6f1a361ecdc228343
-
Filesize
635KB
MD590d0a1ae97d397576676be384bfa8f21
SHA173f161508ff81e8691e3ee551fa43b54f2661c3d
SHA256f15cf1be8d67604c8a3888a4c0fe06d96eac2a4a4c79ccd7815a27834ec04b5f
SHA51202e0471cbbc03144a2919c0fc27afa33e14d429dc666ea57e375d9abe6271ade598a4388f84fee2e3e909287e2cd63ae1be8b3eafbe4fa09609b6c6e16609408