Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 23:54
Behavioral task
behavioral1
Sample
7b9c9cf03e3512c011633325ccd89076.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b9c9cf03e3512c011633325ccd89076.exe
Resource
win10v2004-20231215-en
General
-
Target
7b9c9cf03e3512c011633325ccd89076.exe
-
Size
5.8MB
-
MD5
7b9c9cf03e3512c011633325ccd89076
-
SHA1
001c5f763b2ffc65c1c8abb427093078bc3dcdbc
-
SHA256
e45e6e53c4cffdf15d202074d0f8f9580aabe998856fdefc27631962908faf23
-
SHA512
622a2461bc84d25d766a41055f0f2ca1307bb39ce3c333af9b9f4d63114343efe0d2ca070f0a338e75d097e621798983b400545f40681d5bde4f2af7418def4b
-
SSDEEP
98304:3GseY4HBUCczzM3RH8Ae75uIXTv64HBUCczzM3:3GseHWCdOuIDvZWC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2796 7b9c9cf03e3512c011633325ccd89076.exe -
Executes dropped EXE 1 IoCs
pid Process 2796 7b9c9cf03e3512c011633325ccd89076.exe -
Loads dropped DLL 1 IoCs
pid Process 2232 7b9c9cf03e3512c011633325ccd89076.exe -
resource yara_rule behavioral1/memory/2232-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000d000000012251-10.dat upx behavioral1/memory/2232-14-0x0000000003F60000-0x000000000444F000-memory.dmp upx behavioral1/memory/2796-17-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2232 7b9c9cf03e3512c011633325ccd89076.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2232 7b9c9cf03e3512c011633325ccd89076.exe 2796 7b9c9cf03e3512c011633325ccd89076.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2796 2232 7b9c9cf03e3512c011633325ccd89076.exe 28 PID 2232 wrote to memory of 2796 2232 7b9c9cf03e3512c011633325ccd89076.exe 28 PID 2232 wrote to memory of 2796 2232 7b9c9cf03e3512c011633325ccd89076.exe 28 PID 2232 wrote to memory of 2796 2232 7b9c9cf03e3512c011633325ccd89076.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b9c9cf03e3512c011633325ccd89076.exe"C:\Users\Admin\AppData\Local\Temp\7b9c9cf03e3512c011633325ccd89076.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\7b9c9cf03e3512c011633325ccd89076.exeC:\Users\Admin\AppData\Local\Temp\7b9c9cf03e3512c011633325ccd89076.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2796
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD569f5feb43a5e1abe4aaeb2ad579263b1
SHA18872984758cfe58233a735938a958efa340e428e
SHA2565b77115458cecc69ee8fae9a330e4f2c5a6c0ebb8329a7b6ff8ae93016d6a34b
SHA512785bb3c14c3e1c2a5b07ef582d16f48d98eafd7e219144b5a017ce4b6739ddad677ac13b025dbbd1591fe3d97c74448a27e2d9e4ec9e710aa1223cbdcdb23d54