Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
a1c6ca6ac53767bb9d6895f18ba2e784.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1c6ca6ac53767bb9d6895f18ba2e784.exe
Resource
win10v2004-20240221-en
General
-
Target
a1c6ca6ac53767bb9d6895f18ba2e784.exe
-
Size
1.9MB
-
MD5
a1c6ca6ac53767bb9d6895f18ba2e784
-
SHA1
92a70e507183298c44b3fc64dca40b4d89651f2d
-
SHA256
1861254a57c7a618b4507d5282f2587b426656fbbefea74e566e3dfc7bfd1cd1
-
SHA512
38e54921c890d53ebe500e76f79c0e2d8a693867eb5575279699690fa0bb83151155dec1bb126c80a4111fa32b07bf0aebe450f9fe3b48bbc13b711a66bd4c55
-
SSDEEP
49152:Qoa1taC070dTAoYulUyadMwrSa3BrcT/mQ/geTMMi:Qoa1taC0foYrhd7SOcLxwMi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2976 5985.tmp -
Executes dropped EXE 1 IoCs
pid Process 2976 5985.tmp -
Loads dropped DLL 1 IoCs
pid Process 1500 a1c6ca6ac53767bb9d6895f18ba2e784.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1500 wrote to memory of 2976 1500 a1c6ca6ac53767bb9d6895f18ba2e784.exe 28 PID 1500 wrote to memory of 2976 1500 a1c6ca6ac53767bb9d6895f18ba2e784.exe 28 PID 1500 wrote to memory of 2976 1500 a1c6ca6ac53767bb9d6895f18ba2e784.exe 28 PID 1500 wrote to memory of 2976 1500 a1c6ca6ac53767bb9d6895f18ba2e784.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1c6ca6ac53767bb9d6895f18ba2e784.exe"C:\Users\Admin\AppData\Local\Temp\a1c6ca6ac53767bb9d6895f18ba2e784.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\5985.tmp"C:\Users\Admin\AppData\Local\Temp\5985.tmp" --splashC:\Users\Admin\AppData\Local\Temp\a1c6ca6ac53767bb9d6895f18ba2e784.exe AB6DEF0F39F5CDEA7C661FB8E6D85B361C5CE5A942098232964BE2FF5EAD6CDA006B04F12F2AFE9C6438F349752ABCC55FCC2C46BB680A00A8B5A2CD19FFA6392⤵
- Deletes itself
- Executes dropped EXE
PID:2976
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD590fd448e3a28e1b58548bd48228d4605
SHA18289c1a81f23e6df6531903076854c4b301b073c
SHA25638f495f8ce478091235bd56bd786b8ec621e6fb2c163327e04811ee15eed4bee
SHA512e76c716cec04da0bd0cb372a4660c93206270b64aeffba8b33a8cf1f5580b576c58c37372fae985ff54e25660532b069b178007cd87d518381ba27c51648446d