Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
b58a1bd01a526dde43ec25f5e8576f5b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b58a1bd01a526dde43ec25f5e8576f5b.exe
Resource
win10v2004-20240226-en
General
-
Target
b58a1bd01a526dde43ec25f5e8576f5b.exe
-
Size
82KB
-
MD5
b58a1bd01a526dde43ec25f5e8576f5b
-
SHA1
0861353559a627df20fc8d74db2c7318c0346aef
-
SHA256
e63feaba4f7b086666bc1a975640afcfdc827875951483a9ae8216afb20c8f73
-
SHA512
b7207845e2b1c230c8023eab2ba7eaef622e055a9e140aeca5a97bb039df79d11d2773156f3d6e78963e4ef1b7713195f6a29637971f1dd82947bd6bb4684a80
-
SSDEEP
1536:j7uuinqAhJrmrG8ZIe8dm6Psx2WjvEtRp/CqeVHr7fGUcz+iB:j7uuRA2rbQnPsQZtRVUffGUc9B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1972 b58a1bd01a526dde43ec25f5e8576f5b.exe -
Executes dropped EXE 1 IoCs
pid Process 1972 b58a1bd01a526dde43ec25f5e8576f5b.exe -
Loads dropped DLL 1 IoCs
pid Process 2032 b58a1bd01a526dde43ec25f5e8576f5b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2032 b58a1bd01a526dde43ec25f5e8576f5b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2032 b58a1bd01a526dde43ec25f5e8576f5b.exe 1972 b58a1bd01a526dde43ec25f5e8576f5b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1972 2032 b58a1bd01a526dde43ec25f5e8576f5b.exe 29 PID 2032 wrote to memory of 1972 2032 b58a1bd01a526dde43ec25f5e8576f5b.exe 29 PID 2032 wrote to memory of 1972 2032 b58a1bd01a526dde43ec25f5e8576f5b.exe 29 PID 2032 wrote to memory of 1972 2032 b58a1bd01a526dde43ec25f5e8576f5b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b58a1bd01a526dde43ec25f5e8576f5b.exe"C:\Users\Admin\AppData\Local\Temp\b58a1bd01a526dde43ec25f5e8576f5b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\b58a1bd01a526dde43ec25f5e8576f5b.exeC:\Users\Admin\AppData\Local\Temp\b58a1bd01a526dde43ec25f5e8576f5b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1972
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5ee1874230fcda931639288092dc719ab
SHA19c37bcddc09d38ea132f3896ea32b73451d9bea3
SHA2565683ca548383ba6ff19aa2b1528dd7f67a46e542b32f2b24a2643db3a84e29a9
SHA5125f5c213d977e9f019dfa80697d28a8c3faa34f0a8730bd2a76adb8076d65bcf8b028840719ca54bc0d154b738139e01c906cda56a86e7f540c9e521e2ce1a113