Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
77ad9bf5898555c36ce5abeb39943adf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
77ad9bf5898555c36ce5abeb39943adf.exe
Resource
win10v2004-20231222-en
General
-
Target
77ad9bf5898555c36ce5abeb39943adf.exe
-
Size
1.9MB
-
MD5
77ad9bf5898555c36ce5abeb39943adf
-
SHA1
4b313f09dc92913430a73b43ad4fa8bb9af1e3a0
-
SHA256
c85f55f4ce7864b8ba3fdc42685f6c3bde1b90803f5d617696e08693b36973a3
-
SHA512
200dd0221bb49c5e1ceceee0f8049045f6682c390831d5e7a0ba8c7e2e103c2fb17a916525c17372d98276a44e49a41d26237128592b25d6e4becb1442bf8150
-
SSDEEP
49152:Qoa1taC070dz3zUrufJRi9rEM7XAVYceOPZ:Qoa1taC003gCfq9rEGeYCZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2508 4D84.tmp -
Executes dropped EXE 1 IoCs
pid Process 2508 4D84.tmp -
Loads dropped DLL 1 IoCs
pid Process 1016 77ad9bf5898555c36ce5abeb39943adf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1016 wrote to memory of 2508 1016 77ad9bf5898555c36ce5abeb39943adf.exe 28 PID 1016 wrote to memory of 2508 1016 77ad9bf5898555c36ce5abeb39943adf.exe 28 PID 1016 wrote to memory of 2508 1016 77ad9bf5898555c36ce5abeb39943adf.exe 28 PID 1016 wrote to memory of 2508 1016 77ad9bf5898555c36ce5abeb39943adf.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\77ad9bf5898555c36ce5abeb39943adf.exe"C:\Users\Admin\AppData\Local\Temp\77ad9bf5898555c36ce5abeb39943adf.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\4D84.tmp"C:\Users\Admin\AppData\Local\Temp\4D84.tmp" --splashC:\Users\Admin\AppData\Local\Temp\77ad9bf5898555c36ce5abeb39943adf.exe 50D8CE35F2E314E658359834BD5C99282500CB1F6F85F5E9AA5D57E4AD921CA5C61DA64750A9A18AC5ECFC4B57161EA023972B913E4AF372D1EA0DE70B8F267B2⤵
- Deletes itself
- Executes dropped EXE
PID:2508
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD52d6ed19a7910406c55daf603014228da
SHA1f0cff3f2add26dae62449c7811a73cbbb14a76e7
SHA2567ceb676cfbf277029a2ff3bce2d872f76a626cd537cc11e96282e98fa00a30df
SHA5121946c9f13683f0197af3705dedd162a92907b9a63e76a63491ea7d107b6ff5e2edf3f2cf6a61f7e9f6b910dfa6ef413cdc48598a3fdeac64bbca608d513a3e3a