Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 12:11
Behavioral task
behavioral1
Sample
c5d7a1955f49e4308217ca2a9824d157.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c5d7a1955f49e4308217ca2a9824d157.exe
Resource
win10v2004-20240226-en
General
-
Target
c5d7a1955f49e4308217ca2a9824d157.exe
-
Size
1.3MB
-
MD5
c5d7a1955f49e4308217ca2a9824d157
-
SHA1
66190fb23fd916ce8e1f1fd796f50032f4fb22f7
-
SHA256
3438a27fca9fefb29272717d785a6f83590d1195c14f8005382160c31b25c1fa
-
SHA512
e1660c161ab8a0b74bced9e58afbe5c4e929d61f87fc5a2121d663cb2007ac45ad1b8b3bce85ab0136f05dad89137f59d855fdf61ea9bcc9395ea7568809fee7
-
SSDEEP
24576:GDtRxC8Gsgma3uPKz3fAC+XP4OAdl7ZfywQNvG:AR0jRmauwfR+/4OK1IwQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1160 c5d7a1955f49e4308217ca2a9824d157.exe -
Executes dropped EXE 1 IoCs
pid Process 1160 c5d7a1955f49e4308217ca2a9824d157.exe -
Loads dropped DLL 1 IoCs
pid Process 2228 c5d7a1955f49e4308217ca2a9824d157.exe -
resource yara_rule behavioral1/memory/2228-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x00090000000122be-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2228 c5d7a1955f49e4308217ca2a9824d157.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2228 c5d7a1955f49e4308217ca2a9824d157.exe 1160 c5d7a1955f49e4308217ca2a9824d157.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1160 2228 c5d7a1955f49e4308217ca2a9824d157.exe 28 PID 2228 wrote to memory of 1160 2228 c5d7a1955f49e4308217ca2a9824d157.exe 28 PID 2228 wrote to memory of 1160 2228 c5d7a1955f49e4308217ca2a9824d157.exe 28 PID 2228 wrote to memory of 1160 2228 c5d7a1955f49e4308217ca2a9824d157.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5d7a1955f49e4308217ca2a9824d157.exe"C:\Users\Admin\AppData\Local\Temp\c5d7a1955f49e4308217ca2a9824d157.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\c5d7a1955f49e4308217ca2a9824d157.exeC:\Users\Admin\AppData\Local\Temp\c5d7a1955f49e4308217ca2a9824d157.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1160
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b156baa95c5659e6f7841f80072abf89
SHA18b3d05deb03c4ccb0cc8159b9229dda25c50ac53
SHA2566b59513d188ea821b0675cce94d4adf5bfb0f5ab265f91256177ebfe0d8bf51a
SHA5122a1f9fbb172013d979482882f66ff3186196081ce7157b86e60350ebb761feaac8c6afd4c2fd0bf18f26380c36fd5d18bc4c05b746366b314f5492e1ba4e5c1f