Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
786ed671a6377bdf06058615d03d6d07.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
786ed671a6377bdf06058615d03d6d07.exe
Resource
win10v2004-20231215-en
General
-
Target
786ed671a6377bdf06058615d03d6d07.exe
-
Size
82KB
-
MD5
786ed671a6377bdf06058615d03d6d07
-
SHA1
e689f30916520f03934879fbf9ed3c20d67bdc95
-
SHA256
a1e3ef7411af01c59c0df63545794405eed3fe9da6fbbfc6d5651da5e6cf0d41
-
SHA512
b955623d81b68f87fbf154151c13e2bb8a6f9e51493b2914dbbd8a7034004843bda3a5799ca9bf741c0dade6941c713a37502464eff6b87e518fcae67444180a
-
SSDEEP
1536:VDiuq497R3eylXIcfo33gS20M+GrkbvA8PwfgETr9r+SfBhMNza8RAp:VDiq93eylNo33C0M+nJYzTl+UWeAAp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2472 786ed671a6377bdf06058615d03d6d07.exe -
Executes dropped EXE 1 IoCs
pid Process 2472 786ed671a6377bdf06058615d03d6d07.exe -
Loads dropped DLL 1 IoCs
pid Process 1776 786ed671a6377bdf06058615d03d6d07.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1776 786ed671a6377bdf06058615d03d6d07.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1776 786ed671a6377bdf06058615d03d6d07.exe 2472 786ed671a6377bdf06058615d03d6d07.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1776 wrote to memory of 2472 1776 786ed671a6377bdf06058615d03d6d07.exe 29 PID 1776 wrote to memory of 2472 1776 786ed671a6377bdf06058615d03d6d07.exe 29 PID 1776 wrote to memory of 2472 1776 786ed671a6377bdf06058615d03d6d07.exe 29 PID 1776 wrote to memory of 2472 1776 786ed671a6377bdf06058615d03d6d07.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\786ed671a6377bdf06058615d03d6d07.exe"C:\Users\Admin\AppData\Local\Temp\786ed671a6377bdf06058615d03d6d07.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\786ed671a6377bdf06058615d03d6d07.exeC:\Users\Admin\AppData\Local\Temp\786ed671a6377bdf06058615d03d6d07.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2472
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD565ba60e42e00f1f5dbbc709c1e393149
SHA150d09878f9bdbe7e25530539b86195db58edf918
SHA2565639dfd3d7b0482f84578a2cce4c89577e97e6acfc75a5ad79d82bb1b599f371
SHA5127affd2f59e753e3ef6e72d9b86d9bac5a55ae65da9adffe232008e6eeb6da4a66984edd7c5cb063f899f387bf9e21aea88c70f24443fffe56a961062ae6b9060