Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
7cf163ddf099e1a8197c2acf7aaf1484.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7cf163ddf099e1a8197c2acf7aaf1484.exe
Resource
win10v2004-20231215-en
General
-
Target
7cf163ddf099e1a8197c2acf7aaf1484.exe
-
Size
257KB
-
MD5
7cf163ddf099e1a8197c2acf7aaf1484
-
SHA1
97abbb2a88f9603748f78a1c934a0dfe4d176df3
-
SHA256
d39edef8ffb588c2c7a197bba6b8ade680e91e52c4288dd94cf621af86ea221e
-
SHA512
0921a04c607fd91ada884c3a79661142a3a2efc041f9fbd578d11536f63ced0376728baae76e8a9586405a294f3931628a55b8834f8381be0c65c4c10da19ceb
-
SSDEEP
6144:J0hMcD39a7O6mb+oHO9beyKt/4H2iW39m2g45oS:Julg7dmbXHO9KHtOBWtm2g45oS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2996 svchosn.exe -
Loads dropped DLL 2 IoCs
pid Process 1384 7cf163ddf099e1a8197c2acf7aaf1484.exe 1384 7cf163ddf099e1a8197c2acf7aaf1484.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\svchosn.exe 7cf163ddf099e1a8197c2acf7aaf1484.exe File opened for modification C:\Windows\SysWOW64\svchosn.exe 7cf163ddf099e1a8197c2acf7aaf1484.exe File opened for modification C:\Windows\SysWOW64\svchosn.exe svchosn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1384 wrote to memory of 2996 1384 7cf163ddf099e1a8197c2acf7aaf1484.exe 28 PID 1384 wrote to memory of 2996 1384 7cf163ddf099e1a8197c2acf7aaf1484.exe 28 PID 1384 wrote to memory of 2996 1384 7cf163ddf099e1a8197c2acf7aaf1484.exe 28 PID 1384 wrote to memory of 2996 1384 7cf163ddf099e1a8197c2acf7aaf1484.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cf163ddf099e1a8197c2acf7aaf1484.exe"C:\Users\Admin\AppData\Local\Temp\7cf163ddf099e1a8197c2acf7aaf1484.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\svchosn.exeC:\Windows\system32\svchosn.exe -k netsvcs2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2996
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5757c622c9459877150bf84c622035aee
SHA176c0e501ccbf344414c8e32a62eb1f0aa7c4ddcb
SHA2563853b555d7574ef25d5e65cad7d117ac2f9590c499cbffd89f58406962a09c04
SHA512b12258a14797e204c96bbda051aeb45127a74bcc18c7d405b86532d2cdcbc56de4c3649610280515eb349925bdda3d89eb469fc314bfe05030745015de765e6d
-
Filesize
234KB
MD550cea25ea11115644f56784cb1bcd35c
SHA15186b26b32960d3441d66ef537637342d8325bbf
SHA25658ca4cd9d01bc59db2c9e7efacbb86d4f33a916a3a4e187ef6b6f0a34d21716f
SHA5127e396c40b72ca744dc43b06ac96cbe23f72ed4f9096a82b10cd1e2d77b828e15106dbfecde22948358a8f0a61252b5e46d92fb7dce9d7c1edbf30d8068134aa8
-
Filesize
136KB
MD5f6e68576747a98542d8ac7ca1b89308b
SHA1a6da77a503cf9471a306611c8e051fb03c103297
SHA256c3f4add1751d993624d69c1a57291b664ca4203c811b7d7b634a779c685feeb9
SHA5121df6fc0a54cfd67d8b4c2d7df6283b97baae58ac6ab1b111323ce69b777b28114e6460c21ce7ec41f6bf6b6848253dde8757cf194ff9ffcb894748a0c8714143