Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
acd830a00b916ce8065dc2e8ea156305.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
acd830a00b916ce8065dc2e8ea156305.exe
Resource
win10v2004-20240226-en
General
-
Target
acd830a00b916ce8065dc2e8ea156305.exe
-
Size
1.6MB
-
MD5
acd830a00b916ce8065dc2e8ea156305
-
SHA1
b338ad85eb1082d1ec437ce8d9547b66460764bf
-
SHA256
cb70843f3cef671831a7588cbfd6a2d010a7a0f9fec59d904b1af4256d2ffdeb
-
SHA512
4ae13077f1c6f1eca70d8390bb515d5555eb947f4a5710d33f01a0a4018706c204527a34255d8a4f436c2a4cfb7fdddbf01ae8c4b4092cb669ed2c6750df7519
-
SSDEEP
24576:l/XtKK2QyttKwOdx+VtaVgGFd+9iGY1t2UWtaHw71+QIb8Vu8vMY0gYGoYYVMbQ:lMKrcozAnapFd+92tbJQ7PSv26tMc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1200 acd830a00b916ce8065dc2e8ea156305.exe -
Executes dropped EXE 1 IoCs
pid Process 1200 acd830a00b916ce8065dc2e8ea156305.exe -
Loads dropped DLL 1 IoCs
pid Process 2356 acd830a00b916ce8065dc2e8ea156305.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2356 acd830a00b916ce8065dc2e8ea156305.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2356 acd830a00b916ce8065dc2e8ea156305.exe 1200 acd830a00b916ce8065dc2e8ea156305.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 1200 2356 acd830a00b916ce8065dc2e8ea156305.exe 28 PID 2356 wrote to memory of 1200 2356 acd830a00b916ce8065dc2e8ea156305.exe 28 PID 2356 wrote to memory of 1200 2356 acd830a00b916ce8065dc2e8ea156305.exe 28 PID 2356 wrote to memory of 1200 2356 acd830a00b916ce8065dc2e8ea156305.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\acd830a00b916ce8065dc2e8ea156305.exe"C:\Users\Admin\AppData\Local\Temp\acd830a00b916ce8065dc2e8ea156305.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\acd830a00b916ce8065dc2e8ea156305.exeC:\Users\Admin\AppData\Local\Temp\acd830a00b916ce8065dc2e8ea156305.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1200
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5b956f9e47db51b2e38837d5d82526691
SHA1ee1900a19f6d557471359a94568d8796528fce0c
SHA256797f5c0eb9d4a078da760670151aa5406ad3a6190d7d9c25891df8c4473d43fc
SHA512abb6d6bc5020c2e97177709c0da5ed6cbfbf6e438f4206f630fbb733390e3d2fab9fcd9237f306e7ad156e088037690e32203796b99e4cfc4eb4e3ac44b047e2