Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
c2093aa356c73e1126a984e3fe955a25.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2093aa356c73e1126a984e3fe955a25.exe
Resource
win10v2004-20240226-en
General
-
Target
c2093aa356c73e1126a984e3fe955a25.exe
-
Size
82KB
-
MD5
c2093aa356c73e1126a984e3fe955a25
-
SHA1
1df11f7bcf485334eab8dbcb191f683dd828089f
-
SHA256
da4e29012e1f00f329bcb913ffe8c13dee784e15506392c52d38dc8d3cfeba65
-
SHA512
ed8e8f4e644ac5bbace6c8c4159f610e467d3e55a3584983879d5ee19943e85c42c6a13208f6942e8631a22071b95a7762ca338b8ef1b9d62cdccf1aab439011
-
SSDEEP
1536:J9/TdNivY1jLr9Rm+HXsm7YQTqFf0cj+JJpWgc6T+dAUyO3LcbwK+kNXsEJaJYHG:J9rflLJRccOFf0cyJHWgcdiOQbwKjXs1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1092 c2093aa356c73e1126a984e3fe955a25.exe -
Executes dropped EXE 1 IoCs
pid Process 1092 c2093aa356c73e1126a984e3fe955a25.exe -
Loads dropped DLL 1 IoCs
pid Process 1040 c2093aa356c73e1126a984e3fe955a25.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1040 c2093aa356c73e1126a984e3fe955a25.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1040 c2093aa356c73e1126a984e3fe955a25.exe 1092 c2093aa356c73e1126a984e3fe955a25.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1040 wrote to memory of 1092 1040 c2093aa356c73e1126a984e3fe955a25.exe 29 PID 1040 wrote to memory of 1092 1040 c2093aa356c73e1126a984e3fe955a25.exe 29 PID 1040 wrote to memory of 1092 1040 c2093aa356c73e1126a984e3fe955a25.exe 29 PID 1040 wrote to memory of 1092 1040 c2093aa356c73e1126a984e3fe955a25.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2093aa356c73e1126a984e3fe955a25.exe"C:\Users\Admin\AppData\Local\Temp\c2093aa356c73e1126a984e3fe955a25.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\c2093aa356c73e1126a984e3fe955a25.exeC:\Users\Admin\AppData\Local\Temp\c2093aa356c73e1126a984e3fe955a25.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1092
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD54bc12954b93af0e2084dfd560abff8ab
SHA174ed144d81c53803e3a2b56a175eccce5f261064
SHA25656b1164ab918a4557710f6349f276f424ba7451260db55dcf96baef99b1f66b5
SHA512011f056a07cb4c35afa65d39b93fffed52976d0c2bd8849908d070ba50c8bf1a18a4b5ebf2ce2e7360dcb0b3c1405eecdc37646fc71cbfabcf29e1e2741faf5f