Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 04:49
Behavioral task
behavioral1
Sample
7c32c78af125e4e486e99c60ba8545b2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c32c78af125e4e486e99c60ba8545b2.exe
Resource
win10v2004-20231215-en
General
-
Target
7c32c78af125e4e486e99c60ba8545b2.exe
-
Size
5.8MB
-
MD5
7c32c78af125e4e486e99c60ba8545b2
-
SHA1
b908248c21a5971766f41b4378b2dd4d1ccc1896
-
SHA256
1c98933aee3d74a70a20cbfcd81857dc9f54b5bdda0fd9d0a4b2d0f44715fc45
-
SHA512
e69029c2900a7f10f728c5fa26a4566485fafa3ab951278cbc0d33117c8d797d51b0bd0f170dc6f1282dcab80eeae6c12e92035f5833fa3061873b81ea8d6733
-
SSDEEP
98304:VTb9xXnk/Sn/Hau42c1joCjMPkNwk6alDAqD7z3uboHau42c1joCjMPkNwk6:VTbfaSPauq1jI86FA7y2auq1jI86
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2332 7c32c78af125e4e486e99c60ba8545b2.exe -
Executes dropped EXE 1 IoCs
pid Process 2332 7c32c78af125e4e486e99c60ba8545b2.exe -
Loads dropped DLL 1 IoCs
pid Process 2056 7c32c78af125e4e486e99c60ba8545b2.exe -
resource yara_rule behavioral1/memory/2056-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000a000000012243-10.dat upx behavioral1/files/0x000a000000012243-13.dat upx behavioral1/memory/2332-15-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2056 7c32c78af125e4e486e99c60ba8545b2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2056 7c32c78af125e4e486e99c60ba8545b2.exe 2332 7c32c78af125e4e486e99c60ba8545b2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2332 2056 7c32c78af125e4e486e99c60ba8545b2.exe 28 PID 2056 wrote to memory of 2332 2056 7c32c78af125e4e486e99c60ba8545b2.exe 28 PID 2056 wrote to memory of 2332 2056 7c32c78af125e4e486e99c60ba8545b2.exe 28 PID 2056 wrote to memory of 2332 2056 7c32c78af125e4e486e99c60ba8545b2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c32c78af125e4e486e99c60ba8545b2.exe"C:\Users\Admin\AppData\Local\Temp\7c32c78af125e4e486e99c60ba8545b2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\7c32c78af125e4e486e99c60ba8545b2.exeC:\Users\Admin\AppData\Local\Temp\7c32c78af125e4e486e99c60ba8545b2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2332
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD50adee3a6d21c36944e5c9d39fe0b6417
SHA16ab5cfd6635ab7373c49aea65f738cfb115677de
SHA256d14e6fef8617cf41338604f1c9bb8c779962b4600cb1d1f3d32430b5afb763d2
SHA512bf7c94f2b3f044b6d08283b9d624f9377b261ad8d02cdab01ec08a971250c7d9bcb15feb3531a7e02733ba4d52da2fbd0d273770a645af4c49dd40f91848971d
-
Filesize
128KB
MD5702d5b18be58da4a7f94a7a986ed20a2
SHA1f1d6e10c145ac2d86a0e7f512ff448b544e3e144
SHA256bb7c2ed6f9b4ffc05d6091a1197fc9d400a2a9d55bcd1e59688c1f20a3662368
SHA512c8b9688332932032b72c85e6a04e3d474362ade0203b3c9d12a4e56ad0a198dcd1c2501ac7212441028ae1e6b345b25aa7013e5718524e4e54b1ed7928287724