Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
7ecf5cc692e86b466ded5d780f91ef26.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ecf5cc692e86b466ded5d780f91ef26.exe
Resource
win10v2004-20231222-en
General
-
Target
7ecf5cc692e86b466ded5d780f91ef26.exe
-
Size
504KB
-
MD5
7ecf5cc692e86b466ded5d780f91ef26
-
SHA1
8ecd1de2b853e1b84d3d11aba71e59cb472e99b2
-
SHA256
15819e629f6a29a3bdeed29bc43b1907ae2df8f56aff6bcfac4c26ebcaac4d36
-
SHA512
6c2b9785abe243cb227acfdc0b97cdadbfaec7ad22a00713d09b68ffd29ee8e4eb424ca11d74d0b3e2a6582d9739b3e1f6e690366c98f38473e70abbc9408399
-
SSDEEP
12288:SSxG05888888888888W88888888888/4khP50GG7/uuzggp6NMWfpRoNtqJPBI:ZxGY70G6BzzwNMWPPG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2908 7ecf5cc692e86b466ded5d780f91ef26.tmp -
Loads dropped DLL 4 IoCs
pid Process 2344 7ecf5cc692e86b466ded5d780f91ef26.exe 2908 7ecf5cc692e86b466ded5d780f91ef26.tmp 2908 7ecf5cc692e86b466ded5d780f91ef26.tmp 2908 7ecf5cc692e86b466ded5d780f91ef26.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2908 2344 7ecf5cc692e86b466ded5d780f91ef26.exe 28 PID 2344 wrote to memory of 2908 2344 7ecf5cc692e86b466ded5d780f91ef26.exe 28 PID 2344 wrote to memory of 2908 2344 7ecf5cc692e86b466ded5d780f91ef26.exe 28 PID 2344 wrote to memory of 2908 2344 7ecf5cc692e86b466ded5d780f91ef26.exe 28 PID 2344 wrote to memory of 2908 2344 7ecf5cc692e86b466ded5d780f91ef26.exe 28 PID 2344 wrote to memory of 2908 2344 7ecf5cc692e86b466ded5d780f91ef26.exe 28 PID 2344 wrote to memory of 2908 2344 7ecf5cc692e86b466ded5d780f91ef26.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ecf5cc692e86b466ded5d780f91ef26.exe"C:\Users\Admin\AppData\Local\Temp\7ecf5cc692e86b466ded5d780f91ef26.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\is-KRA2K.tmp\7ecf5cc692e86b466ded5d780f91ef26.tmp"C:\Users\Admin\AppData\Local\Temp\is-KRA2K.tmp\7ecf5cc692e86b466ded5d780f91ef26.tmp" /SL5="$30156,127487,119296,C:\Users\Admin\AppData\Local\Temp\7ecf5cc692e86b466ded5d780f91ef26.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2908
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD54de6f44810bad050ac81f45549d58f34
SHA1e001b982a0a978deed96789f943bf295dd2ba1d8
SHA256cf8a77f4cbd38f6ab44fcff738f81ec8dfdaa7ef5a64d62fdd84c6fe897adff5
SHA512550e468c3d6660ce2030fca16549eace9153610e19621cba83fea691f8d0091edb596a869168cf4b7f80fa55a808ca1703e4e2beffb3ade5af3fb67b6ead6673
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
15KB
MD52ea92b11633afadba96648666b9df024
SHA125cae5012a8fe86c34e5918613be3fc4e7480fbd
SHA256ad04e5eeec0ed157c4c6c5a1b919746e04d6270a15d8d6fb192bbc566d2fd3d7
SHA512dd85de944271aa333d9eac175bd2167c5cb8771ece679af888a96e340dd5f1728ad3e3f9209546f5e17f22e91a9659e7168e12a7935ab4820e135a9f1f534471