Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 12:29
Behavioral task
behavioral1
Sample
bb434573cd75c5375c6efa6739393543.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb434573cd75c5375c6efa6739393543.exe
Resource
win10v2004-20240226-en
General
-
Target
bb434573cd75c5375c6efa6739393543.exe
-
Size
2.7MB
-
MD5
bb434573cd75c5375c6efa6739393543
-
SHA1
f5a89ea11c21da81c5068d6af13f1c17655cd4fe
-
SHA256
eefc53d13f077f9b18c67821839189ab5b5f0670ee9f8265558e42532d1c7f0f
-
SHA512
aea0dabeacaf4d1fe5b78c502494513653c5aff0b512b7ed4f36710dc07417754395717ad93786a7f8e38d0d17d7e4b10ff40fe1a0332bfad590525aabfdb4e1
-
SSDEEP
49152:DYqq5kgEr52s4Fm/kZecauvTJ6VYehsip6mOh2XdiMibA/eipq/9BA4ukf:DYk7l2s4Fm/ktd58sipz/vx69i4ukf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2936 bb434573cd75c5375c6efa6739393543.exe -
Executes dropped EXE 1 IoCs
pid Process 2936 bb434573cd75c5375c6efa6739393543.exe -
Loads dropped DLL 1 IoCs
pid Process 2272 bb434573cd75c5375c6efa6739393543.exe -
resource yara_rule behavioral1/memory/2272-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b00000001224f-10.dat upx behavioral1/memory/2936-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2272 bb434573cd75c5375c6efa6739393543.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2272 bb434573cd75c5375c6efa6739393543.exe 2936 bb434573cd75c5375c6efa6739393543.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2936 2272 bb434573cd75c5375c6efa6739393543.exe 28 PID 2272 wrote to memory of 2936 2272 bb434573cd75c5375c6efa6739393543.exe 28 PID 2272 wrote to memory of 2936 2272 bb434573cd75c5375c6efa6739393543.exe 28 PID 2272 wrote to memory of 2936 2272 bb434573cd75c5375c6efa6739393543.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb434573cd75c5375c6efa6739393543.exe"C:\Users\Admin\AppData\Local\Temp\bb434573cd75c5375c6efa6739393543.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\bb434573cd75c5375c6efa6739393543.exeC:\Users\Admin\AppData\Local\Temp\bb434573cd75c5375c6efa6739393543.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5ab47f74ff8977ef4be066f309263226d
SHA1f795131030c9f053f5ac612a0a8e222f15752e13
SHA256e077a5bd7b120d7352a104f8c55202715e45ba38d078f4c28bb465444903a719
SHA512e9a7a4cccc88f044c518735a48f7262818dd96e365638a256bfa8a2551dc3ff25156c2a10bece476c0606e3ebc6ccb2250535fbb2cfd71c839bb6ea250293e8a