Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2024, 17:19

General

  • Target

    b93e5a2e8779157d93c4e483cf5f1e06.exe

  • Size

    1.6MB

  • MD5

    b93e5a2e8779157d93c4e483cf5f1e06

  • SHA1

    ad8fa9f7587d4eafc5cc716e773cb30551d133f3

  • SHA256

    a391273e1302246196bce1ce205197a6d936493f31373083b9beacbf6a047cd2

  • SHA512

    3c08e5b22259ccd85a5b74588f053ff44ae4b3e463162bf4d353aaeff6c4104e334137a2a9609ff9328c1cdd5bd95742e1d0a06f74e34a0fec6a3948243e68cf

  • SSDEEP

    49152:kIyBGeeMY8bpzu43eNJHolNmJhOJuc226tMc:7yYjMFbpzre7D08c22O

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b93e5a2e8779157d93c4e483cf5f1e06.exe
    "C:\Users\Admin\AppData\Local\Temp\b93e5a2e8779157d93c4e483cf5f1e06.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\b93e5a2e8779157d93c4e483cf5f1e06.exe
      C:\Users\Admin\AppData\Local\Temp\b93e5a2e8779157d93c4e483cf5f1e06.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2224

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\b93e5a2e8779157d93c4e483cf5f1e06.exe

    Filesize

    1.6MB

    MD5

    fd9ea711372f5a060f4252be7e7c652f

    SHA1

    d3a0e297d87123aaaeac5467994182eabe7b2e20

    SHA256

    80b4c579c925da1f7a97ea4e869524d7e0bb10c01bf9b0a883654b3edf42ff6b

    SHA512

    150d77332e2d6ac3737656cff7244ef4d0337f4626eccd014a47a4d0eccf8afce7055b6a753a3459cbdecc723e9fc8ffedbd3415d33b035070f41ff6b8ac0f94

  • memory/2148-0-0x0000000000400000-0x0000000000877000-memory.dmp

    Filesize

    4.5MB

  • memory/2148-1-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/2148-2-0x0000000001AD0000-0x0000000001F47000-memory.dmp

    Filesize

    4.5MB

  • memory/2148-14-0x00000000039F0000-0x0000000003E67000-memory.dmp

    Filesize

    4.5MB

  • memory/2148-13-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/2224-16-0x0000000000400000-0x0000000000877000-memory.dmp

    Filesize

    4.5MB

  • memory/2224-17-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/2224-18-0x0000000001AD0000-0x0000000001F47000-memory.dmp

    Filesize

    4.5MB

  • memory/2224-24-0x0000000003720000-0x000000000396D000-memory.dmp

    Filesize

    2.3MB

  • memory/2224-23-0x0000000000400000-0x0000000000640000-memory.dmp

    Filesize

    2.2MB