Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
8d89c896814ee01afe068629d39116f3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d89c896814ee01afe068629d39116f3.exe
Resource
win10v2004-20231215-en
General
-
Target
8d89c896814ee01afe068629d39116f3.exe
-
Size
82KB
-
MD5
8d89c896814ee01afe068629d39116f3
-
SHA1
249cfebcea01f9b7cb8b778959a472d8e0e9ec9c
-
SHA256
50d3e2771e6a88ede8106251061a11452d718ce20d94203119a85e848c64026a
-
SHA512
6fc50c2c8c086c36df4bdb7b676285c8d99fb58482d26fe407e7ff560195caac6213ed6f96a497866f0fbcfc9242183ddc4406a509ced36e67036bf8c6c7cdcc
-
SSDEEP
1536:LbIl5We2UNcMzMZFTVfotCyizTiuuLmiuqCJa9Ilf8xRC/xKPFaBemM1+1tVBITh:LM7njhY/1pquuLmiuNJaKkyoP8Bemw+E
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2872 8d89c896814ee01afe068629d39116f3.exe -
Executes dropped EXE 1 IoCs
pid Process 2872 8d89c896814ee01afe068629d39116f3.exe -
Loads dropped DLL 1 IoCs
pid Process 2536 8d89c896814ee01afe068629d39116f3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2536 8d89c896814ee01afe068629d39116f3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2536 8d89c896814ee01afe068629d39116f3.exe 2872 8d89c896814ee01afe068629d39116f3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2872 2536 8d89c896814ee01afe068629d39116f3.exe 17 PID 2536 wrote to memory of 2872 2536 8d89c896814ee01afe068629d39116f3.exe 17 PID 2536 wrote to memory of 2872 2536 8d89c896814ee01afe068629d39116f3.exe 17 PID 2536 wrote to memory of 2872 2536 8d89c896814ee01afe068629d39116f3.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d89c896814ee01afe068629d39116f3.exe"C:\Users\Admin\AppData\Local\Temp\8d89c896814ee01afe068629d39116f3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\8d89c896814ee01afe068629d39116f3.exeC:\Users\Admin\AppData\Local\Temp\8d89c896814ee01afe068629d39116f3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2872
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD55000aebcd38135629898a49538fd4406
SHA19d8078c055753ded59d6b04bf289ffb6c5573277
SHA256c2ef31e2f04071baafe0c4b9b4b246d5bed8612773f396372a2b7c9e402411c5
SHA5127199a093ae0564c8cd5975be0468ae5ff42d73665b14ed2806b085188a736bb027ea019bd1e66419ec878f96cc1bcda9f2f8b6fb1681e790d7fa1a1201af7b7e