Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 21:50
Behavioral task
behavioral1
Sample
a2d36ca61e4c87a98e1f2b1478aa937a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2d36ca61e4c87a98e1f2b1478aa937a.exe
Resource
win10v2004-20240221-en
General
-
Target
a2d36ca61e4c87a98e1f2b1478aa937a.exe
-
Size
2.9MB
-
MD5
a2d36ca61e4c87a98e1f2b1478aa937a
-
SHA1
8ed53560c062d5dea3166854f7f217cdd01a85ef
-
SHA256
41f4ab5ff8f820a11dd1b736ecb3e8cefa6202ecadd932bb9de59c7668563742
-
SHA512
0457eed8d9ca463b7b85eb5da986dfa43019df96c083a8025b0e25e441f5b870b755947b345b90bb698a7247fa9c03b3685a514ad68413ea6f04fd3924cbf6a6
-
SSDEEP
49152:hMGqNkGvdKTAOqQct4iAqK/BgBYoc1P4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:7x0MsAos/eBYoc1gg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2604 a2d36ca61e4c87a98e1f2b1478aa937a.exe -
Executes dropped EXE 1 IoCs
pid Process 2604 a2d36ca61e4c87a98e1f2b1478aa937a.exe -
Loads dropped DLL 1 IoCs
pid Process 2196 a2d36ca61e4c87a98e1f2b1478aa937a.exe -
resource yara_rule behavioral1/memory/2196-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x0009000000012226-10.dat upx behavioral1/memory/2604-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x0009000000012226-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2196 a2d36ca61e4c87a98e1f2b1478aa937a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2196 a2d36ca61e4c87a98e1f2b1478aa937a.exe 2604 a2d36ca61e4c87a98e1f2b1478aa937a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2604 2196 a2d36ca61e4c87a98e1f2b1478aa937a.exe 28 PID 2196 wrote to memory of 2604 2196 a2d36ca61e4c87a98e1f2b1478aa937a.exe 28 PID 2196 wrote to memory of 2604 2196 a2d36ca61e4c87a98e1f2b1478aa937a.exe 28 PID 2196 wrote to memory of 2604 2196 a2d36ca61e4c87a98e1f2b1478aa937a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2d36ca61e4c87a98e1f2b1478aa937a.exe"C:\Users\Admin\AppData\Local\Temp\a2d36ca61e4c87a98e1f2b1478aa937a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\a2d36ca61e4c87a98e1f2b1478aa937a.exeC:\Users\Admin\AppData\Local\Temp\a2d36ca61e4c87a98e1f2b1478aa937a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2604
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD54ec2cffb99491128ad18c0f7af5261bd
SHA13cc9caeea2a13401fe1ba981732b48e6937e66d0
SHA256396c77bc8fae1269c53c2f86aa7857b1f26ef83bd8cf6a98080dd7c6c53c4d80
SHA51226877b69b28ba8fd6d536ce0900ce30c7482757c6afa8a846756d79e8077d385a89b777a75d1d4953f9af9e82458acc45f10bfe528929fb2790366c485ff2d9b
-
Filesize
896KB
MD565e95d3f556d42bb34ce205e663011af
SHA17944a8c075c60f55c5e141e467bb814816d3b9a3
SHA256c58dd91305fbf5d25ce7dbd36b89ed93437a4e0c3dfdbcd1da998254dad21402
SHA512619d9a284d834e92297777c63e90338a82340bbd2fbcfee897283feeebd50d528485c7a827108c417c1269b952a678d29a16aaf3b780b2a3bb8f2412ab03bd4b