Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
8dc1c1d7b2e3f31e6cbcab3883ba38af.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8dc1c1d7b2e3f31e6cbcab3883ba38af.exe
Resource
win10v2004-20231222-en
General
-
Target
8dc1c1d7b2e3f31e6cbcab3883ba38af.exe
-
Size
82KB
-
MD5
8dc1c1d7b2e3f31e6cbcab3883ba38af
-
SHA1
c4cb18d45732acf24cd49d5cb8c5f592b5b5ff53
-
SHA256
063eb0a6fc5498eab3993ad56c2b59b6e1b60b31983cb6e8d2fa6bf3a2c634f7
-
SHA512
4b8f74c6d9a22cb7ffc6cd3115f6db4bb4d15004b552858f02a248da9bd1a60a42a4e9ab12ba5b4eb137b6e8ddb532f2905010c9238769857579d3aa8f99398e
-
SSDEEP
1536:nIoHbI7TpgzE/23GIYxkw2c8GE2arqU1t34ke7ce:IAbMpE13GDn8Gmdj4keoe
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2100 8dc1c1d7b2e3f31e6cbcab3883ba38af.exe -
Executes dropped EXE 1 IoCs
pid Process 2100 8dc1c1d7b2e3f31e6cbcab3883ba38af.exe -
Loads dropped DLL 1 IoCs
pid Process 2500 8dc1c1d7b2e3f31e6cbcab3883ba38af.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2500 8dc1c1d7b2e3f31e6cbcab3883ba38af.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2500 8dc1c1d7b2e3f31e6cbcab3883ba38af.exe 2100 8dc1c1d7b2e3f31e6cbcab3883ba38af.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2100 2500 8dc1c1d7b2e3f31e6cbcab3883ba38af.exe 29 PID 2500 wrote to memory of 2100 2500 8dc1c1d7b2e3f31e6cbcab3883ba38af.exe 29 PID 2500 wrote to memory of 2100 2500 8dc1c1d7b2e3f31e6cbcab3883ba38af.exe 29 PID 2500 wrote to memory of 2100 2500 8dc1c1d7b2e3f31e6cbcab3883ba38af.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dc1c1d7b2e3f31e6cbcab3883ba38af.exe"C:\Users\Admin\AppData\Local\Temp\8dc1c1d7b2e3f31e6cbcab3883ba38af.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\8dc1c1d7b2e3f31e6cbcab3883ba38af.exeC:\Users\Admin\AppData\Local\Temp\8dc1c1d7b2e3f31e6cbcab3883ba38af.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2100
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5a4cf19057502d1d16cd23bcdf3c39f64
SHA123c43ee491f6606b4619348c8ca0c05653eaf300
SHA2569bad1d3b1f4795f8aa02f23c3aa05341c76e74d7a5d027c87261d67ddfe72cfe
SHA51287b29c71a78553d8058a92ffd7a7161d31866c0b003be7ae25f1cc3c55f54d5a8a7661568fa32169f7d1fbc6375c44d8fe469afa8f59d31cc3b7fe8049794e49