Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
aaca7099f12fa8db86237c293f998634.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aaca7099f12fa8db86237c293f998634.exe
Resource
win10v2004-20240226-en
General
-
Target
aaca7099f12fa8db86237c293f998634.exe
-
Size
1.9MB
-
MD5
aaca7099f12fa8db86237c293f998634
-
SHA1
827e77dbc4720948d30223d3540e61ea1d8f40d3
-
SHA256
f9daa8d6a300bd61185bafb7fbac649fa40ebe1e2fae2eb04ef10cc51b8b661a
-
SHA512
831906630a241cc374144d9ffa9654758342a6bf3797e272aade57b67105c7970cb7b56d35d8156f295f8efa67458c7b7c3498f113e02c7312aecff0428d2ee0
-
SSDEEP
49152:Qoa1taC070dMtw2Xg7GUAi90jQQUWw1vLgQ:Qoa1taC0dt2dmjDw1vLgQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1724 25C9.tmp -
Executes dropped EXE 1 IoCs
pid Process 1724 25C9.tmp -
Loads dropped DLL 1 IoCs
pid Process 2088 aaca7099f12fa8db86237c293f998634.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1724 2088 aaca7099f12fa8db86237c293f998634.exe 28 PID 2088 wrote to memory of 1724 2088 aaca7099f12fa8db86237c293f998634.exe 28 PID 2088 wrote to memory of 1724 2088 aaca7099f12fa8db86237c293f998634.exe 28 PID 2088 wrote to memory of 1724 2088 aaca7099f12fa8db86237c293f998634.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaca7099f12fa8db86237c293f998634.exe"C:\Users\Admin\AppData\Local\Temp\aaca7099f12fa8db86237c293f998634.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\25C9.tmp"C:\Users\Admin\AppData\Local\Temp\25C9.tmp" --splashC:\Users\Admin\AppData\Local\Temp\aaca7099f12fa8db86237c293f998634.exe 5B5A5422700CC47D71DF0719BD0B6A897F9E7ACDFD97F2E46866761A8D2ACA07EE58BD1B91F2F6BBD5B1FBBC905FFDF4D6AD306AB4AE533CC35A92FF44AFF7742⤵
- Deletes itself
- Executes dropped EXE
PID:1724
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5b808a6003e0caa50ad62698d7a0eef4d
SHA1531eb7bce782e90700491be7dced60d3f43f2790
SHA256f96d3392ee600d34903927cbd7d76d2f0af1ed54ce26084a8f6affd84f8fcb80
SHA51200d18b90511704c287553b8622b219952f93e9ffb9cb61812941d78773f64caa101a373d391ef97fcf37541465ef2b200697f0d2cbe484d718018386196c0447