Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 10:40
Behavioral task
behavioral1
Sample
86af3ab3f31142fa93be9e540d4bf313.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
86af3ab3f31142fa93be9e540d4bf313.exe
Resource
win10v2004-20231215-en
General
-
Target
86af3ab3f31142fa93be9e540d4bf313.exe
-
Size
59KB
-
MD5
86af3ab3f31142fa93be9e540d4bf313
-
SHA1
0a1b7340db75e62e8a8e5edaf056675479215187
-
SHA256
ab74e83ea6ab7b6d8a3a1027991189c79d17e0cb00a3f947eb4ebc3d57f4585e
-
SHA512
f0026e0fb18938b10ea2ba4284109d4204eb81b1632a88fc310dfdf6f7a2593e10060f41559e8937c41a1c17055b811aa9364ce9492b6077843754f742f79505
-
SSDEEP
1536:ITJXsRpM1PwHfY+aftBUA4l59M1AIW4gEhW:ITF0+9wHql20AO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 86af3ab3f31142fa93be9e540d4bf313.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 86af3ab3f31142fa93be9e540d4bf313.exe -
Loads dropped DLL 1 IoCs
pid Process 2060 86af3ab3f31142fa93be9e540d4bf313.exe -
resource yara_rule behavioral1/memory/2060-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/files/0x0009000000012252-10.dat upx behavioral1/memory/2660-17-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2060 86af3ab3f31142fa93be9e540d4bf313.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2060 86af3ab3f31142fa93be9e540d4bf313.exe 2660 86af3ab3f31142fa93be9e540d4bf313.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2660 2060 86af3ab3f31142fa93be9e540d4bf313.exe 29 PID 2060 wrote to memory of 2660 2060 86af3ab3f31142fa93be9e540d4bf313.exe 29 PID 2060 wrote to memory of 2660 2060 86af3ab3f31142fa93be9e540d4bf313.exe 29 PID 2060 wrote to memory of 2660 2060 86af3ab3f31142fa93be9e540d4bf313.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\86af3ab3f31142fa93be9e540d4bf313.exe"C:\Users\Admin\AppData\Local\Temp\86af3ab3f31142fa93be9e540d4bf313.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\86af3ab3f31142fa93be9e540d4bf313.exeC:\Users\Admin\AppData\Local\Temp\86af3ab3f31142fa93be9e540d4bf313.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2660
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5524c4e9b9f0146901ca1af9e837e3ca2
SHA1ce8c2e6bf907b9d40a9951fae9024e54cfcbaa72
SHA2560db8a91e2ad99f17d32409aa7f2925cf9be5495dda9771da6057f66831e76587
SHA5128d04bf2c6e4236989422560c6dea74207484c5dfb5b7d4ccc12b937687340e4610c7e685509f7dda49f788758c563c9cac15bba325873d9450ca182a4624d21b