Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
75d5f5dfe055f1ec59cabdd917831f5ade7dc229655dcdbd45728eabb43cfa25.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
75d5f5dfe055f1ec59cabdd917831f5ade7dc229655dcdbd45728eabb43cfa25.exe
Resource
win10v2004-20240226-en
General
-
Target
75d5f5dfe055f1ec59cabdd917831f5ade7dc229655dcdbd45728eabb43cfa25.exe
-
Size
79KB
-
MD5
9bdb68fde7c5f964bec32874d88fbde3
-
SHA1
9929c1c9f9183c0e60b1d1ded8f311282fbd832a
-
SHA256
75d5f5dfe055f1ec59cabdd917831f5ade7dc229655dcdbd45728eabb43cfa25
-
SHA512
94e5cf0d9c4085f82522ebc8f399ca1b7a621d0ca5cc55ab5f2d6ed1c81af113cfb67bf215a7d4add646c3162c3a44c37a9648e21490a508409fea530e7b4618
-
SSDEEP
1536:zv01aasQWgd2LoYXCRGIbOQA8AkqUhMb2nuy5wgIP0CSJ+5yTsB8GMGlZ5G:zv0sasQSsYXrGdqU7uy5w9WMywN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3012 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 3004 cmd.exe 3004 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2408 wrote to memory of 3004 2408 75d5f5dfe055f1ec59cabdd917831f5ade7dc229655dcdbd45728eabb43cfa25.exe 29 PID 2408 wrote to memory of 3004 2408 75d5f5dfe055f1ec59cabdd917831f5ade7dc229655dcdbd45728eabb43cfa25.exe 29 PID 2408 wrote to memory of 3004 2408 75d5f5dfe055f1ec59cabdd917831f5ade7dc229655dcdbd45728eabb43cfa25.exe 29 PID 2408 wrote to memory of 3004 2408 75d5f5dfe055f1ec59cabdd917831f5ade7dc229655dcdbd45728eabb43cfa25.exe 29 PID 3004 wrote to memory of 3012 3004 cmd.exe 30 PID 3004 wrote to memory of 3012 3004 cmd.exe 30 PID 3004 wrote to memory of 3012 3004 cmd.exe 30 PID 3004 wrote to memory of 3012 3004 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\75d5f5dfe055f1ec59cabdd917831f5ade7dc229655dcdbd45728eabb43cfa25.exe"C:\Users\Admin\AppData\Local\Temp\75d5f5dfe055f1ec59cabdd917831f5ade7dc229655dcdbd45728eabb43cfa25.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3012
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5c7b3c6c77340d513ded2de6150d04167
SHA10fc19c2ef8fda134804b8eb3c5b0499d4dcfc915
SHA256d73a5bbff4c394454e349b61e1b46b9899bb7c1bf5aad193c41ed36efb3bfe1b
SHA512e829016bedad645117d90be0f3ac8c01103198523e50b66f986ae828d5dde57ba1c6a24633d39294f6631b3d07e1c20971bf2e62706f6e46e677b4a343937660