Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 10:30
Behavioral task
behavioral1
Sample
8eeb93003da4d9c8685c8d78190175b7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8eeb93003da4d9c8685c8d78190175b7.exe
Resource
win10v2004-20231215-en
General
-
Target
8eeb93003da4d9c8685c8d78190175b7.exe
-
Size
5.3MB
-
MD5
8eeb93003da4d9c8685c8d78190175b7
-
SHA1
66f8c1127a34519b1af407719b544b48ee0d91ce
-
SHA256
92983319a078d081ce4ed74fda7b7e3a561e28fc7d85b1bf09f9480341b2769a
-
SHA512
eba1bf8e8b5a001f8849b2b63411d11a5c19fed5cfd8f810678cc738b3020d3d04b5bdfa402fbc28316c0c2fae53c8c92513e29738fdea2d560e0dcf71db7e17
-
SSDEEP
98304:B7Uf3WyViQ1B6Fqhv7sO61564ekFzekTnI71B6Fqhv7sO61564ek:U3d0Q1B2gvkaAF9TnO1B2gvkaA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2744 8eeb93003da4d9c8685c8d78190175b7.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 8eeb93003da4d9c8685c8d78190175b7.exe -
Loads dropped DLL 1 IoCs
pid Process 2788 8eeb93003da4d9c8685c8d78190175b7.exe -
resource yara_rule behavioral1/memory/2788-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000b000000012223-11.dat upx behavioral1/files/0x000b000000012223-14.dat upx behavioral1/memory/2744-17-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2788 8eeb93003da4d9c8685c8d78190175b7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2788 8eeb93003da4d9c8685c8d78190175b7.exe 2744 8eeb93003da4d9c8685c8d78190175b7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2744 2788 8eeb93003da4d9c8685c8d78190175b7.exe 28 PID 2788 wrote to memory of 2744 2788 8eeb93003da4d9c8685c8d78190175b7.exe 28 PID 2788 wrote to memory of 2744 2788 8eeb93003da4d9c8685c8d78190175b7.exe 28 PID 2788 wrote to memory of 2744 2788 8eeb93003da4d9c8685c8d78190175b7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8eeb93003da4d9c8685c8d78190175b7.exe"C:\Users\Admin\AppData\Local\Temp\8eeb93003da4d9c8685c8d78190175b7.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\8eeb93003da4d9c8685c8d78190175b7.exeC:\Users\Admin\AppData\Local\Temp\8eeb93003da4d9c8685c8d78190175b7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2744
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
895KB
MD5f4e7e3445bd99f094fac78926dd12a3c
SHA16e82a4ebf90bdf38122de82403c6a594437351f2
SHA256c108c9aef081d8df164d05ee95dbfe914a72b87a6475ee48b2d3ab683d7b4f41
SHA51225852d3e685165660b672379a09dd4c5cbb1272938a518d75014049d63d682d478455278f791f7e65094154fa8c5125ed421bff43f3654071f0e3e5e454162b7
-
Filesize
1.5MB
MD5ab5e8ec2be95b1f5f882313e38b88338
SHA168ad37cebd02ffa3ec5aae7bad47e0f9aafd3a6f
SHA256b838d6d01129ef72bf78fc161854ca0f67d9997203a104535bc2e4438c3d9eb2
SHA51202249ac6cdea37a8392cd73a59a61aaa70ce19907b98d141fb6fd01125ed518f5331119790c32cf419fc2c67fddc6676c4848df89c33148d27dcdc48c6de41b4