Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
b9accc6f47c9af2b02b2d0e2baf27887.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b9accc6f47c9af2b02b2d0e2baf27887.exe
Resource
win10v2004-20240226-en
General
-
Target
b9accc6f47c9af2b02b2d0e2baf27887.exe
-
Size
165KB
-
MD5
b9accc6f47c9af2b02b2d0e2baf27887
-
SHA1
641f1f2b08dc2ccb18e9c1fd327ebe9d73a06de1
-
SHA256
83a23e150f81237005b762cd1af1b3ae408f7042ea58166c5bcf4811d47e7be7
-
SHA512
9636a98c2a516882f589066d2ab85ad9ae8d730c0bcd7671bb9e1d0dce40846866d648aa7837603fc13bbea1e4ae7ef125ebe27ac85bcde9dcd63f018b7c8d19
-
SSDEEP
3072:fScOoXlUPJuPLIxkoSna0RNbANvQwEy91/V+tXnAaPdMgLvSZzYzUf9N:qu1URu0ernauNbo1eAaPdMBzZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1796 b9accc6f47c9af2b02b2d0e2baf27887.exe -
Executes dropped EXE 1 IoCs
pid Process 1796 b9accc6f47c9af2b02b2d0e2baf27887.exe -
Loads dropped DLL 1 IoCs
pid Process 2396 b9accc6f47c9af2b02b2d0e2baf27887.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2396 b9accc6f47c9af2b02b2d0e2baf27887.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2396 b9accc6f47c9af2b02b2d0e2baf27887.exe 1796 b9accc6f47c9af2b02b2d0e2baf27887.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1796 2396 b9accc6f47c9af2b02b2d0e2baf27887.exe 29 PID 2396 wrote to memory of 1796 2396 b9accc6f47c9af2b02b2d0e2baf27887.exe 29 PID 2396 wrote to memory of 1796 2396 b9accc6f47c9af2b02b2d0e2baf27887.exe 29 PID 2396 wrote to memory of 1796 2396 b9accc6f47c9af2b02b2d0e2baf27887.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9accc6f47c9af2b02b2d0e2baf27887.exe"C:\Users\Admin\AppData\Local\Temp\b9accc6f47c9af2b02b2d0e2baf27887.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\b9accc6f47c9af2b02b2d0e2baf27887.exeC:\Users\Admin\AppData\Local\Temp\b9accc6f47c9af2b02b2d0e2baf27887.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1796
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD525f392c9d31b08fcbd39d6af56da9e8c
SHA1910a7c9e6c44993f52dee34b6b59cab2d59b4410
SHA25627491f232fe1c49bd487b5234208139a6fa724a1cde6d52d4a6e5db1d00435c3
SHA5120aee112cd0275478afd68eb356e02ee97f6a8cd8b6f5a30c1e4ff69f661d18818b6a339bf474ae7a4d86a8ce8704a1bae7970d91c31d8cc8d6b460335f2f0cca