Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 20:51
Behavioral task
behavioral1
Sample
c6d49f449b9ada17ff8b41351f3abd2b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6d49f449b9ada17ff8b41351f3abd2b.exe
Resource
win10v2004-20240226-en
General
-
Target
c6d49f449b9ada17ff8b41351f3abd2b.exe
-
Size
2.9MB
-
MD5
c6d49f449b9ada17ff8b41351f3abd2b
-
SHA1
40d18cab809c17449bfc1e844923017043fdfc2e
-
SHA256
823b67d0e311b371e11ca00a5e9cf35dfb92a81694890055ccb16cf1b1be9b73
-
SHA512
0e007bb996c660ed17979e64d7c7577b4b63f2c82965d50d610ff840971336677788fb7732e4cd3ef40999383f1906b9980d0064fc7720c76644c9d4434f0d88
-
SSDEEP
49152:m7ixkP+EeK1cV0uVZok3OcORLHWEGM59Baj8BBT4SfcsUjoh48TyMPkXdwkyZ:m7EEeK1Vookk2EGgHau42c1joCjMPkNQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3004 c6d49f449b9ada17ff8b41351f3abd2b.exe -
Executes dropped EXE 1 IoCs
pid Process 3004 c6d49f449b9ada17ff8b41351f3abd2b.exe -
Loads dropped DLL 1 IoCs
pid Process 348 c6d49f449b9ada17ff8b41351f3abd2b.exe -
resource yara_rule behavioral1/memory/348-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000c000000012233-10.dat upx behavioral1/memory/3004-15-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 348 c6d49f449b9ada17ff8b41351f3abd2b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 348 c6d49f449b9ada17ff8b41351f3abd2b.exe 3004 c6d49f449b9ada17ff8b41351f3abd2b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 348 wrote to memory of 3004 348 c6d49f449b9ada17ff8b41351f3abd2b.exe 27 PID 348 wrote to memory of 3004 348 c6d49f449b9ada17ff8b41351f3abd2b.exe 27 PID 348 wrote to memory of 3004 348 c6d49f449b9ada17ff8b41351f3abd2b.exe 27 PID 348 wrote to memory of 3004 348 c6d49f449b9ada17ff8b41351f3abd2b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6d49f449b9ada17ff8b41351f3abd2b.exe"C:\Users\Admin\AppData\Local\Temp\c6d49f449b9ada17ff8b41351f3abd2b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\c6d49f449b9ada17ff8b41351f3abd2b.exeC:\Users\Admin\AppData\Local\Temp\c6d49f449b9ada17ff8b41351f3abd2b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3004
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD5df2869abc71dc1c8a553e43fa2379b55
SHA1e9faa5efee0eaf15917f43b4f4137b0ccb13ca49
SHA2563e3502741a13de0cab80d9b193223e6d87616048416a902f5d67cea8c8a27399
SHA5129d99ac2e3045211acb217c5a9f4044313d4c99cb56affa8dbe5e7fee5acf189504ef39bd9548b29eff348f6b0b30ac6e0a0b40f7f9640dd4862968d8e2e16d5f