Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 22:28
Behavioral task
behavioral1
Sample
a2dba417b558502de9fffaf0894c733b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2dba417b558502de9fffaf0894c733b.exe
Resource
win10v2004-20240221-en
General
-
Target
a2dba417b558502de9fffaf0894c733b.exe
-
Size
1.3MB
-
MD5
a2dba417b558502de9fffaf0894c733b
-
SHA1
f4a388e41a13506a73ef001538d9afa43b3b9842
-
SHA256
4616798201019a7c59af3bd031eb15497e2e41c37d5eb4c3f02a027ce33f25d9
-
SHA512
aa70a7451fc21c8f380dfa94fbec47623366ce514abe989978fbdfbfd8861eef5e85256be923e82ee987560684d1ae09e19e7c0dcfb1f7fe312be435e67e53cb
-
SSDEEP
24576:jazlxN0MV5N2mUZcWADU52Q+hFf/8y5qWOo0Kk1v30HqjS/4Wc:Glrp5sZ6qeFf/8y5qWoKs30Hyp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2912 a2dba417b558502de9fffaf0894c733b.exe -
Executes dropped EXE 1 IoCs
pid Process 2912 a2dba417b558502de9fffaf0894c733b.exe -
Loads dropped DLL 1 IoCs
pid Process 1220 a2dba417b558502de9fffaf0894c733b.exe -
resource yara_rule behavioral1/memory/1220-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x0008000000012249-10.dat upx behavioral1/memory/2912-17-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1220 a2dba417b558502de9fffaf0894c733b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1220 a2dba417b558502de9fffaf0894c733b.exe 2912 a2dba417b558502de9fffaf0894c733b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2912 1220 a2dba417b558502de9fffaf0894c733b.exe 28 PID 1220 wrote to memory of 2912 1220 a2dba417b558502de9fffaf0894c733b.exe 28 PID 1220 wrote to memory of 2912 1220 a2dba417b558502de9fffaf0894c733b.exe 28 PID 1220 wrote to memory of 2912 1220 a2dba417b558502de9fffaf0894c733b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2dba417b558502de9fffaf0894c733b.exe"C:\Users\Admin\AppData\Local\Temp\a2dba417b558502de9fffaf0894c733b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\a2dba417b558502de9fffaf0894c733b.exeC:\Users\Admin\AppData\Local\Temp\a2dba417b558502de9fffaf0894c733b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2912
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD500358932ba6db9ebad4221002c2a2acb
SHA15ca80f318f08affd4feabbf0850c99d6fab78da0
SHA2569bc74f783b968f05966185b0f688bc6e6a61c434b43b328fcc307c5031d3f5a2
SHA512d525b6f16ad5917f02f2c6d81c8656b108f9672e0d3cc6fa06bf7e07321a729cc5ecbf41e254ca9fb9db4695ef896505acc8fb35f9e4d39c606c65e174fc17d5