Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
8ca7ae67139eebc014e7a425b1a7b9a1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ca7ae67139eebc014e7a425b1a7b9a1.exe
Resource
win10v2004-20231222-en
General
-
Target
8ca7ae67139eebc014e7a425b1a7b9a1.exe
-
Size
82KB
-
MD5
8ca7ae67139eebc014e7a425b1a7b9a1
-
SHA1
2ef5179e383faa551cddc69f8aec355ff2c76f92
-
SHA256
b815bc8e56b3c307214eee06f4d3c19d7d900a735afcd3e7abbb2b5212f97c97
-
SHA512
c1a63066fd15a9bb7400de2f0e2370d2c14c56ceec5f5f55098d4af62b6d972bd1f35fdbf4265899ab25dd7ab7e671f843316ae1f09f9403630f69c1e7ea8927
-
SSDEEP
1536:zDIgNBiQr2P+M5skqkEdEGwjQW/kNrnynvKfAGNA8A75jTsMPigQNvQ0h2:LN++MZqAGw8eQcvKfDNNM5j4MPsno
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2676 8ca7ae67139eebc014e7a425b1a7b9a1.exe -
Executes dropped EXE 1 IoCs
pid Process 2676 8ca7ae67139eebc014e7a425b1a7b9a1.exe -
Loads dropped DLL 1 IoCs
pid Process 2372 8ca7ae67139eebc014e7a425b1a7b9a1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2372 8ca7ae67139eebc014e7a425b1a7b9a1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2372 8ca7ae67139eebc014e7a425b1a7b9a1.exe 2676 8ca7ae67139eebc014e7a425b1a7b9a1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2676 2372 8ca7ae67139eebc014e7a425b1a7b9a1.exe 29 PID 2372 wrote to memory of 2676 2372 8ca7ae67139eebc014e7a425b1a7b9a1.exe 29 PID 2372 wrote to memory of 2676 2372 8ca7ae67139eebc014e7a425b1a7b9a1.exe 29 PID 2372 wrote to memory of 2676 2372 8ca7ae67139eebc014e7a425b1a7b9a1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ca7ae67139eebc014e7a425b1a7b9a1.exe"C:\Users\Admin\AppData\Local\Temp\8ca7ae67139eebc014e7a425b1a7b9a1.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\8ca7ae67139eebc014e7a425b1a7b9a1.exeC:\Users\Admin\AppData\Local\Temp\8ca7ae67139eebc014e7a425b1a7b9a1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2676
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5b9778c1567256e04d3e4bbe896a13161
SHA13171636ea34caa429a39da672d3b33c8e7152412
SHA2563b1065aac95b7268c575a855a6e49c27cbd82804e6d1bd5970beddde59c116c9
SHA51292905cb5d207ab824d7a6e383e71ae4a605da2b76ec20c35803a6d385c74341b1d8e9040fe72284123b4ca3ca63acab7685d6def4b8e7536fa3c9d54928f4b23