Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 19:04

General

  • Target

    426e7f4d4d4d127fdb841dd14f1ff38c3af09f41f2040990c2154c894a7e0d4f.exe

  • Size

    192KB

  • MD5

    3ee9de81669c8fc04fa4377c97bd3703

  • SHA1

    5f6216cced23e7cf46ae12ee443c50bd08c23d98

  • SHA256

    426e7f4d4d4d127fdb841dd14f1ff38c3af09f41f2040990c2154c894a7e0d4f

  • SHA512

    b9b4d98a18550336ebf1f744b073d4f9f14b6562d6459870ffb129dab061604218cabcd721e6d8ff09f290d17d4e1ea237339cabacd6745e081ea696fa22e022

  • SSDEEP

    3072:/3a5GFXTZdEQrTTAfJgrUysBZdBLA2iZSsmlcfRsfy3yNkxkzbUIz8Q:/3aUFD3EMTkxDpBcrXmSfRseyNlP+Q

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\426e7f4d4d4d127fdb841dd14f1ff38c3af09f41f2040990c2154c894a7e0d4f.exe
    "C:\Users\Admin\AppData\Local\Temp\426e7f4d4d4d127fdb841dd14f1ff38c3af09f41f2040990c2154c894a7e0d4f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\426e7f4d4d4d127fdb841dd14f1ff38c3af09f41f2040990c2154c894a7e0d4f.exe
      C:\Users\Admin\AppData\Local\Temp\426e7f4d4d4d127fdb841dd14f1ff38c3af09f41f2040990c2154c894a7e0d4f.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of UnmapMainImage
      PID:2188

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\426e7f4d4d4d127fdb841dd14f1ff38c3af09f41f2040990c2154c894a7e0d4f.exe

    Filesize

    192KB

    MD5

    100ad98cffe30dd1a97b781c4ba751a6

    SHA1

    0e426359273755f5281080037ad9ee5200da53f4

    SHA256

    3fa11c5b81bbf67bfc3703f89816fcfb9d5de5020dd6570eb00dc0ec652701c0

    SHA512

    2f612d3d6d02783acbdf949a762f5ce989feb3e3126035e955b21b26afdf2232766c4a183099b6d3e0a070faacb01a7fd29d0f95ef4f74582d0cd5125a18cf59

  • memory/2188-12-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2188-13-0x0000000000130000-0x000000000016C000-memory.dmp

    Filesize

    240KB

  • memory/2188-11-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2320-0-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2320-8-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2320-9-0x0000000000160000-0x000000000019C000-memory.dmp

    Filesize

    240KB