Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
4424853f7705508504929f533afc979d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4424853f7705508504929f533afc979d.exe
Resource
win10v2004-20240221-en
General
-
Target
4424853f7705508504929f533afc979d.exe
-
Size
479KB
-
MD5
4424853f7705508504929f533afc979d
-
SHA1
da6a8a8c3cc4c84e40a90f47c9abe70ce3e0bf87
-
SHA256
22a09ca5ac01b6d8c16b36dbc1d89f93a30ab0df007550110e07260c85e1c9ec
-
SHA512
df6750fcd7b574c28e170a9012f3cd65c2a0489cb7d08c55ea2ec11c39ade37b38d1ee15f52bd30f93af536f4863c1dde82953a25e912516b0335011590c1a7a
-
SSDEEP
12288:bO4rfItL8HAy6ykYc3RZKLo7ffHpLZVDsvW8975UO:bO4rQtGALsc3RZKLo73HxIf9VUO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1616 1D41.tmp -
Executes dropped EXE 1 IoCs
pid Process 1616 1D41.tmp -
Loads dropped DLL 1 IoCs
pid Process 1688 4424853f7705508504929f533afc979d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1616 1688 4424853f7705508504929f533afc979d.exe 28 PID 1688 wrote to memory of 1616 1688 4424853f7705508504929f533afc979d.exe 28 PID 1688 wrote to memory of 1616 1688 4424853f7705508504929f533afc979d.exe 28 PID 1688 wrote to memory of 1616 1688 4424853f7705508504929f533afc979d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4424853f7705508504929f533afc979d.exe"C:\Users\Admin\AppData\Local\Temp\4424853f7705508504929f533afc979d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\1D41.tmp"C:\Users\Admin\AppData\Local\Temp\1D41.tmp" --helpC:\Users\Admin\AppData\Local\Temp\4424853f7705508504929f533afc979d.exe 5C71FAD5019CB79D161A8EA20E14DABC6768796B07FBDC52B41BA73DE4B665534733F9F088D56B22337D91E8AA2BCC0F55D65E6BD0A41BBAF01779637441A1082⤵
- Deletes itself
- Executes dropped EXE
PID:1616
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD533abf01aabb365141329782148aa2a86
SHA1ad0722e0927e2ce60bb875c6829f8a0c8114e230
SHA256bb2f645f07959ff6312c1c5ee8186c1c1776f900011bdcc1fbfddfab7c9863c9
SHA5121e39fa2beba16fda8d109d592e530b2d9620b9cb245e881f44c16d2fe2f705c3315ca5768da1b61811414425c1afe427656f78e6a7c3ec45d0784fabee067e8d