Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 10:46
Static task
static1
Behavioral task
behavioral1
Sample
a1ac558b7bce0e54f9c3dd566924f08f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1ac558b7bce0e54f9c3dd566924f08f.exe
Resource
win10v2004-20240221-en
General
-
Target
a1ac558b7bce0e54f9c3dd566924f08f.exe
-
Size
1.9MB
-
MD5
a1ac558b7bce0e54f9c3dd566924f08f
-
SHA1
06069040c10764c62c03536c1c8863263b4824d7
-
SHA256
a6d5618968b7e84fad19d98c28fee31fa5feefc0af431107a53fd8f5f74dc219
-
SHA512
6321d2d003635e6ba9bedf31fde31bd1ba06d09768daf2226476e8734916a026c0c419cfd9961d12b59cb0357b9f410e31debeae0f07c09052a777bb849c9d6f
-
SSDEEP
49152:Qoa1taC070d6cCGU2/eiJP8/P7Rah72TMIOpzS:Qoa1taC0H3li90NYKwIKzS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2720 1507.tmp -
Executes dropped EXE 1 IoCs
pid Process 2720 1507.tmp -
Loads dropped DLL 1 IoCs
pid Process 1660 a1ac558b7bce0e54f9c3dd566924f08f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2720 1660 a1ac558b7bce0e54f9c3dd566924f08f.exe 28 PID 1660 wrote to memory of 2720 1660 a1ac558b7bce0e54f9c3dd566924f08f.exe 28 PID 1660 wrote to memory of 2720 1660 a1ac558b7bce0e54f9c3dd566924f08f.exe 28 PID 1660 wrote to memory of 2720 1660 a1ac558b7bce0e54f9c3dd566924f08f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1ac558b7bce0e54f9c3dd566924f08f.exe"C:\Users\Admin\AppData\Local\Temp\a1ac558b7bce0e54f9c3dd566924f08f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\1507.tmp"C:\Users\Admin\AppData\Local\Temp\1507.tmp" --splashC:\Users\Admin\AppData\Local\Temp\a1ac558b7bce0e54f9c3dd566924f08f.exe 8003C1ED806CBCBDCB760F5511C161252CA8E8BDDD11CE2B600217AAE9F40F65EDF95FA74F625CAEC9D23559D36EA5499A8898CDD9FF48E3BB503C92E4EC97712⤵
- Deletes itself
- Executes dropped EXE
PID:2720
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD557a245c276c30986a1fa29af8eac73e5
SHA173f62a3f42c3ade7ab7d2d11c555f26bbfecc45d
SHA2568b2c924cea33bdc76a6b2ab1b95026d49dc44c8cd919f4f248ac0889509eab08
SHA51296cb89ee366248340da571a5b1c475b23179e337c6152d0563f349b6df63e9fe85449afb190a4e93dfe5bf5bd25b8a97153c976ea92345836cd25096e62e218f