Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 07:55
Static task
static1
Behavioral task
behavioral1
Sample
c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe
Resource
win10v2004-20240226-en
General
-
Target
c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe
-
Size
81KB
-
MD5
c55dac1c9fa463b5ab3a4a3f7baa8f6d
-
SHA1
8b1218f872cc9cc77350365cb2589732c33612df
-
SHA256
391e3824f5d43089e499b7bdf5f4e8de3ea8dc35809055a7fa948e7d0c2dcc8d
-
SHA512
d8661221416d2706b786b1054ae1935a6058534b191040f7cd79b004b3b1a0a33928d7bcd0e3176df8547e9d50ef77af9b71e65d60ce89042aa6e91e33523989
-
SSDEEP
1536:ZkJ6fELmRsNPK8mRxPMpym1oWC9Z3nm0yjNwaWQEtWeHUi4Kjw73:ZkAbRsNjIcy6oWIhsIQEsg3je
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1972 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe -
Executes dropped EXE 1 IoCs
pid Process 1972 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe -
Loads dropped DLL 1 IoCs
pid Process 2972 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2972 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2972 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe 1972 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1972 2972 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe 29 PID 2972 wrote to memory of 1972 2972 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe 29 PID 2972 wrote to memory of 1972 2972 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe 29 PID 2972 wrote to memory of 1972 2972 c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe"C:\Users\Admin\AppData\Local\Temp\c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\c55dac1c9fa463b5ab3a4a3f7baa8f6d.exeC:\Users\Admin\AppData\Local\Temp\c55dac1c9fa463b5ab3a4a3f7baa8f6d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1972
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5ec6681f799ed525ad0bc3bab3fd8fe50
SHA1d108d77ab8df3d8175ded7e1807b5e26cefb6d5f
SHA256a3a66aa01757232903567f311d203c87cf7d35312afb6b293e7d8a285f50f025
SHA512a38dcde86aaedf0302a335582cfe77373fbb7546a86070b967fc3edc961a6b3c182871f851fb154aecdd1d7359ab6784325d9e23bee985197b8d6e179467c7e4