Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
11s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
1df63f6522f3f9dd7db737a0b71be436.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1df63f6522f3f9dd7db737a0b71be436.exe
Resource
win10v2004-20231215-en
General
-
Target
1df63f6522f3f9dd7db737a0b71be436.exe
-
Size
34KB
-
MD5
1df63f6522f3f9dd7db737a0b71be436
-
SHA1
36839e97bf43240b064444d07c0badf57b52949c
-
SHA256
81bb92876afdbb551292028fb7ee5560280d57a1e6e436d1688de3c1d0e6790a
-
SHA512
0974be7377adbca3f777199f0c910228879bd1a43d85793490a9c8ba81a28619249b073b97ae27446dc059ca478351d471292d958dc329cb3ade7617de6635f3
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6A0X/EI4:b/yC4GyNM01GuQMNXw2PSjH+Pk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2316 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 2208 1df63f6522f3f9dd7db737a0b71be436.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2208 1df63f6522f3f9dd7db737a0b71be436.exe 2316 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2316 2208 1df63f6522f3f9dd7db737a0b71be436.exe 28 PID 2208 wrote to memory of 2316 2208 1df63f6522f3f9dd7db737a0b71be436.exe 28 PID 2208 wrote to memory of 2316 2208 1df63f6522f3f9dd7db737a0b71be436.exe 28 PID 2208 wrote to memory of 2316 2208 1df63f6522f3f9dd7db737a0b71be436.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1df63f6522f3f9dd7db737a0b71be436.exe"C:\Users\Admin\AppData\Local\Temp\1df63f6522f3f9dd7db737a0b71be436.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD587fc6e852d9f0ec31bddcd7099d017cf
SHA1a6c6ef3b3f1113e75df758b3c67db41cd1e97ea0
SHA2562bfd93189979f2124ab37c614570d1e77e9a3adb6aaac7e9b470b12b9aff451b
SHA512d52b3481e26b8ec108aba9550fd604cbf38588618a602fa61079af3ee38de32c54bff149ed9b76982d580eef5706c799a8fbaf90cd2d87c7c654a28879da8211