Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
c422181318394d0453378765d2f652e2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c422181318394d0453378765d2f652e2.exe
Resource
win10v2004-20240226-en
General
-
Target
c422181318394d0453378765d2f652e2.exe
-
Size
82KB
-
MD5
c422181318394d0453378765d2f652e2
-
SHA1
558b0b619e6618d704177b3e784cce5deb28f554
-
SHA256
6e9a1d32587cdee9fa61b1f7404f626c457b88cc1d670bbc8c6d4dd53747835b
-
SHA512
c7cbd5263f78fc299fa9c9a3ebab172c61561334c3ef435e91a7894ce1f77bc977e4ae13fef0c7e9eac82833bb569438f3fe4ae009b1a52d8df9d7e81b82e8c8
-
SSDEEP
1536:ESQoWVaqZ83r/lP2rxgLpgo6mZ4geBW987tjxm6twYotaDShpYfq:APV1Z83r/VLYmZ4g987RNnWhifq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1368 c422181318394d0453378765d2f652e2.exe -
Executes dropped EXE 1 IoCs
pid Process 1368 c422181318394d0453378765d2f652e2.exe -
Loads dropped DLL 1 IoCs
pid Process 1660 c422181318394d0453378765d2f652e2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1660 c422181318394d0453378765d2f652e2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1660 c422181318394d0453378765d2f652e2.exe 1368 c422181318394d0453378765d2f652e2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1368 1660 c422181318394d0453378765d2f652e2.exe 29 PID 1660 wrote to memory of 1368 1660 c422181318394d0453378765d2f652e2.exe 29 PID 1660 wrote to memory of 1368 1660 c422181318394d0453378765d2f652e2.exe 29 PID 1660 wrote to memory of 1368 1660 c422181318394d0453378765d2f652e2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c422181318394d0453378765d2f652e2.exe"C:\Users\Admin\AppData\Local\Temp\c422181318394d0453378765d2f652e2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\c422181318394d0453378765d2f652e2.exeC:\Users\Admin\AppData\Local\Temp\c422181318394d0453378765d2f652e2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1368
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD520b6a63d4474983ae009dc1babd33dcb
SHA1ce3a5bc61c5ee4b7bf9c10af673f45af83925189
SHA256934818973fc8ab6fd975f89d64859982247aeca4ba98732260469d6438e399d1
SHA5121687525f530455cf9f3180075d8fbd394e2dd2020daacc7a73830344f869762dc33b2b6c9e0001af6642d350102cdb5b91c6350d333c6cef55161cdbab65ac71