Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe
Resource
win10v2004-20240226-en
General
-
Target
cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe
-
Size
218KB
-
MD5
9d3ad79a51215bd49b90570d0b44cc0a
-
SHA1
ef7686836b6a35b54359ba1d5cbe9456b210adfd
-
SHA256
cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06
-
SHA512
c2d00677c70e3dc36686ee7d3daa4b30b165395de33463a98741ad8c4a0710768ebb76c2612efc9d1f5b11298dbcc393878cad114d16bdf541f931188b819de5
-
SSDEEP
6144:ccO1RQgT//iMN2O0gQIrlcdIVDo4UzFeVjWjX9aLisM+Nea:ccODQI//iMN2OlkdsDoj5tX9aLisvNea
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2896 cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe -
Executes dropped EXE 1 IoCs
pid Process 2896 cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe -
Loads dropped DLL 1 IoCs
pid Process 2924 cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2924 cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2896 cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2896 2924 cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe 29 PID 2924 wrote to memory of 2896 2924 cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe 29 PID 2924 wrote to memory of 2896 2924 cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe 29 PID 2924 wrote to memory of 2896 2924 cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe"C:\Users\Admin\AppData\Local\Temp\cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exeC:\Users\Admin\AppData\Local\Temp\cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2896
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\cfbc592793c1a404d1b8820fa91e1e74f6e68b10f23e791dad9419b5c7248c06.exe
Filesize218KB
MD5ba827e0a0831313109482f9673136cb1
SHA15ca9a032d02ef4e193df65316cb7fb7c9af7ac33
SHA256cff7045b8d226e831ea0448e1db2e49212060188303fb7981dcf2075f17c1779
SHA51233138411c4a704207f5a448761ca0bc866903c8d6247e7a6850c98b042f1cbfb3065801e7bfa4a24b281a51d9cff4e0a41db74c176495d1713b2e2571ce0de9d