Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 15:38
Behavioral task
behavioral1
Sample
9783706add44e924a2ffcd52dd3416e9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9783706add44e924a2ffcd52dd3416e9.exe
Resource
win10v2004-20231215-en
General
-
Target
9783706add44e924a2ffcd52dd3416e9.exe
-
Size
2.9MB
-
MD5
9783706add44e924a2ffcd52dd3416e9
-
SHA1
e4441d85a2b1e0fd85ad8fda2f37bc8873832e02
-
SHA256
1a6d3444f885f5d9cdb1ab5f75a50e26d5dd5e5f7ab555aaf53da67ae2335d46
-
SHA512
506cfa349e6e5b5efb64ccbe8add758f742ebc42a322674f4fbc65e87abbd021eb58a85888927eeea596e10fa57a23221531f692c741f29e224c7ccc53f28729
-
SSDEEP
49152:el21jR3RnU6He6XqLD3KGpfQ2GBc9Baj8BBT4SfcsUjoh48TyMPkXdwkyZ:el21hRUKe686mrHau42c1joCjMPkNwk6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2084 9783706add44e924a2ffcd52dd3416e9.exe -
Executes dropped EXE 1 IoCs
pid Process 2084 9783706add44e924a2ffcd52dd3416e9.exe -
Loads dropped DLL 1 IoCs
pid Process 2108 9783706add44e924a2ffcd52dd3416e9.exe -
resource yara_rule behavioral1/memory/2108-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000d00000001224c-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2108 9783706add44e924a2ffcd52dd3416e9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2108 9783706add44e924a2ffcd52dd3416e9.exe 2084 9783706add44e924a2ffcd52dd3416e9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2084 2108 9783706add44e924a2ffcd52dd3416e9.exe 28 PID 2108 wrote to memory of 2084 2108 9783706add44e924a2ffcd52dd3416e9.exe 28 PID 2108 wrote to memory of 2084 2108 9783706add44e924a2ffcd52dd3416e9.exe 28 PID 2108 wrote to memory of 2084 2108 9783706add44e924a2ffcd52dd3416e9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9783706add44e924a2ffcd52dd3416e9.exe"C:\Users\Admin\AppData\Local\Temp\9783706add44e924a2ffcd52dd3416e9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\9783706add44e924a2ffcd52dd3416e9.exeC:\Users\Admin\AppData\Local\Temp\9783706add44e924a2ffcd52dd3416e9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2084
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5d074201c358c535b251b8901cd95bbba
SHA1c80088a65510a6e2662f2dcec69259e693f6138b
SHA256dd9a437974d998e8cbbd769d8213b66237f67137362138995f55995ba656891a
SHA512009b776b324280d17349874ff2d18edd4c3344bc70fda6ec37dc2248faceac0cb0e984e645d7386b5ddb59f11d6e685511ec7f1810cacf2d3335f3d9d426d224