Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
8aa98fd9be3ee5644d542eb1f2eeebaf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8aa98fd9be3ee5644d542eb1f2eeebaf.exe
Resource
win10v2004-20231215-en
General
-
Target
8aa98fd9be3ee5644d542eb1f2eeebaf.exe
-
Size
82KB
-
MD5
8aa98fd9be3ee5644d542eb1f2eeebaf
-
SHA1
fcfa66fa558386927b6441fc044a66fba869aa20
-
SHA256
a66842517928d2580a44f9b45a488524f1add3eae8df09c4cea92b46476464ab
-
SHA512
e3608c437f960a23c898a2faf92b776ff41acd5c96e8b8197bb7062ee72662753b228829417a5907a858f5b077f280c4a6a86ea5d8a6ef1e3b50d3e3d702b23b
-
SSDEEP
768:ZChMG3+NT2UzPgwG9PO+/PkunW04SWqetiwNz/fiuHV5RvqG7c4ospVbcTI4wg1B:ZE3YwQKfz1eiwBlVXT8EVb+Vmw7wnr2b
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2300 8aa98fd9be3ee5644d542eb1f2eeebaf.exe -
Executes dropped EXE 1 IoCs
pid Process 2300 8aa98fd9be3ee5644d542eb1f2eeebaf.exe -
Loads dropped DLL 1 IoCs
pid Process 1572 8aa98fd9be3ee5644d542eb1f2eeebaf.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1572 8aa98fd9be3ee5644d542eb1f2eeebaf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1572 8aa98fd9be3ee5644d542eb1f2eeebaf.exe 2300 8aa98fd9be3ee5644d542eb1f2eeebaf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1572 wrote to memory of 2300 1572 8aa98fd9be3ee5644d542eb1f2eeebaf.exe 29 PID 1572 wrote to memory of 2300 1572 8aa98fd9be3ee5644d542eb1f2eeebaf.exe 29 PID 1572 wrote to memory of 2300 1572 8aa98fd9be3ee5644d542eb1f2eeebaf.exe 29 PID 1572 wrote to memory of 2300 1572 8aa98fd9be3ee5644d542eb1f2eeebaf.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8aa98fd9be3ee5644d542eb1f2eeebaf.exe"C:\Users\Admin\AppData\Local\Temp\8aa98fd9be3ee5644d542eb1f2eeebaf.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\8aa98fd9be3ee5644d542eb1f2eeebaf.exeC:\Users\Admin\AppData\Local\Temp\8aa98fd9be3ee5644d542eb1f2eeebaf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2300
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD50f3f66d654978f869ccb99d78079ef38
SHA18463650a7f29b3b4504d562a674306e1c272e8d2
SHA256a6e2812796d1d28852098517080ebe958017d4e783eccec540ad9ed1869f41c5
SHA5124c27e80e8f1d17990c33d52de6ec4cc31fb32d38c1d16c1a8a44d61e94e080e00399e076f066e9ce129f988ab7c3ccda61f789dcc0d57b868bce39e3d9f90cf8