Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 00:50

General

  • Target

    c2093aa356c73e1126a984e3fe955a25.exe

  • Size

    82KB

  • MD5

    c2093aa356c73e1126a984e3fe955a25

  • SHA1

    1df11f7bcf485334eab8dbcb191f683dd828089f

  • SHA256

    da4e29012e1f00f329bcb913ffe8c13dee784e15506392c52d38dc8d3cfeba65

  • SHA512

    ed8e8f4e644ac5bbace6c8c4159f610e467d3e55a3584983879d5ee19943e85c42c6a13208f6942e8631a22071b95a7762ca338b8ef1b9d62cdccf1aab439011

  • SSDEEP

    1536:J9/TdNivY1jLr9Rm+HXsm7YQTqFf0cj+JJpWgc6T+dAUyO3LcbwK+kNXsEJaJYHG:J9rflLJRccOFf0cyJHWgcdiOQbwKjXs1

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2093aa356c73e1126a984e3fe955a25.exe
    "C:\Users\Admin\AppData\Local\Temp\c2093aa356c73e1126a984e3fe955a25.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Users\Admin\AppData\Local\Temp\c2093aa356c73e1126a984e3fe955a25.exe
      C:\Users\Admin\AppData\Local\Temp\c2093aa356c73e1126a984e3fe955a25.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1092

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c2093aa356c73e1126a984e3fe955a25.exe

    Filesize

    82KB

    MD5

    4bc12954b93af0e2084dfd560abff8ab

    SHA1

    74ed144d81c53803e3a2b56a175eccce5f261064

    SHA256

    56b1164ab918a4557710f6349f276f424ba7451260db55dcf96baef99b1f66b5

    SHA512

    011f056a07cb4c35afa65d39b93fffed52976d0c2bd8849908d070ba50c8bf1a18a4b5ebf2ce2e7360dcb0b3c1405eecdc37646fc71cbfabcf29e1e2741faf5f

  • memory/1040-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1040-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1040-3-0x0000000000140000-0x000000000016F000-memory.dmp

    Filesize

    188KB

  • memory/1040-15-0x0000000000220000-0x000000000024F000-memory.dmp

    Filesize

    188KB

  • memory/1040-14-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1092-17-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1092-20-0x0000000000140000-0x000000000016F000-memory.dmp

    Filesize

    188KB

  • memory/1092-24-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1092-29-0x0000000000220000-0x000000000023B000-memory.dmp

    Filesize

    108KB