Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/02/2024, 17:28
Behavioral task
behavioral1
Sample
a9bddf102fefd9f881b7f443329b5b19.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9bddf102fefd9f881b7f443329b5b19.exe
Resource
win10v2004-20240226-en
General
-
Target
a9bddf102fefd9f881b7f443329b5b19.exe
-
Size
2.9MB
-
MD5
a9bddf102fefd9f881b7f443329b5b19
-
SHA1
3c96b9d854a3cb2280f342e24ddc4fbf5d96c466
-
SHA256
e157b420557c7faea80fcccc670330e5bd7ad22a482670421284f4e11975aab8
-
SHA512
709f010f6240b47ed79edcf594a56a2b8c2c220288089fc589e586a6ca73e18acf6b3a3afb0e3b16b9f705b5855b15af343d39d3eee3de89ceac1168f66d29e7
-
SSDEEP
49152:JF5WC7UQvSH9o/cnP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:t7pSdAcngg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2096 a9bddf102fefd9f881b7f443329b5b19.exe -
Executes dropped EXE 1 IoCs
pid Process 2096 a9bddf102fefd9f881b7f443329b5b19.exe -
Loads dropped DLL 1 IoCs
pid Process 2332 a9bddf102fefd9f881b7f443329b5b19.exe -
resource yara_rule behavioral1/memory/2332-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000900000001224e-10.dat upx behavioral1/memory/2096-15-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2332 a9bddf102fefd9f881b7f443329b5b19.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2332 a9bddf102fefd9f881b7f443329b5b19.exe 2096 a9bddf102fefd9f881b7f443329b5b19.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2096 2332 a9bddf102fefd9f881b7f443329b5b19.exe 28 PID 2332 wrote to memory of 2096 2332 a9bddf102fefd9f881b7f443329b5b19.exe 28 PID 2332 wrote to memory of 2096 2332 a9bddf102fefd9f881b7f443329b5b19.exe 28 PID 2332 wrote to memory of 2096 2332 a9bddf102fefd9f881b7f443329b5b19.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9bddf102fefd9f881b7f443329b5b19.exe"C:\Users\Admin\AppData\Local\Temp\a9bddf102fefd9f881b7f443329b5b19.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\a9bddf102fefd9f881b7f443329b5b19.exeC:\Users\Admin\AppData\Local\Temp\a9bddf102fefd9f881b7f443329b5b19.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2096
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD562147274a7f17a1f3de809f42cf7007a
SHA145074866b929f9b87486a36d78937e2ebdbc88f8
SHA25661e75c197fbc4a3c3a582e651bec3699aa6a39fb8cb031f16a0445237a5bbdbe
SHA5120ba164e8609d2e34beafe9d74ac766abad7b122076ff5eec3d5c1a1cdc14c6488002b7c157c7be04e0a8082906d7dbdd80626cbae4471db9c9820171ae7001ae