Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
b76cabdf42a5b187520f180b60a445e1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b76cabdf42a5b187520f180b60a445e1.exe
Resource
win10v2004-20240226-en
General
-
Target
b76cabdf42a5b187520f180b60a445e1.exe
-
Size
1.9MB
-
MD5
b76cabdf42a5b187520f180b60a445e1
-
SHA1
c49746fbfa419c020aa4959f517ed9fe98c9e969
-
SHA256
57494750cce7160c5e2fa5757c0a7dd112ecba6609453647783f1e9738f3d640
-
SHA512
ee840fe890c75752d6a422451a4c9b87748a37a874af3d9e0ea34d268172f90dc83920cc7be2851a461c6539172db3e70d8ac7bd22934851fb45a0c07d00e974
-
SSDEEP
49152:Qoa1taC070dXUFvF/Hv+oCsg3xQCmGaLsnyw7e/:Qoa1taC02mvRtD4yAe/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2480 AAB.tmp -
Executes dropped EXE 1 IoCs
pid Process 2480 AAB.tmp -
Loads dropped DLL 1 IoCs
pid Process 2208 b76cabdf42a5b187520f180b60a445e1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2480 2208 b76cabdf42a5b187520f180b60a445e1.exe 28 PID 2208 wrote to memory of 2480 2208 b76cabdf42a5b187520f180b60a445e1.exe 28 PID 2208 wrote to memory of 2480 2208 b76cabdf42a5b187520f180b60a445e1.exe 28 PID 2208 wrote to memory of 2480 2208 b76cabdf42a5b187520f180b60a445e1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b76cabdf42a5b187520f180b60a445e1.exe"C:\Users\Admin\AppData\Local\Temp\b76cabdf42a5b187520f180b60a445e1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\AAB.tmp"C:\Users\Admin\AppData\Local\Temp\AAB.tmp" --splashC:\Users\Admin\AppData\Local\Temp\b76cabdf42a5b187520f180b60a445e1.exe 3E1697BB567E6EC0C9F9A0E97B3962A94BF0DC8FEA771C67F55B79D87A556891ABAA52E4255C042C0C390444FB9483F6618E4EB5EC8C1BDBD9CD7987F50CABE62⤵
- Deletes itself
- Executes dropped EXE
PID:2480
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD57dfd80cf57cf3ca28f73589e8c86e753
SHA1ef2530e6ae38a325b47974d1fc546c925513be30
SHA2563501e0c23318ad5eba224b24c21db030d3cc4d33d4c487d669c12b697b234486
SHA512507d72742fe8086a3ac8a394fd1197b3d1c09ba74c4fec4b857dbd8ace7f0a9364c3a277baad50e980671970ee6cdbcb6acc60a175f00fc3cc5c46c18a869802