Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 11:42
Behavioral task
behavioral1
Sample
c8881bba97172d64a981a2b0836f9a69.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c8881bba97172d64a981a2b0836f9a69.exe
Resource
win10v2004-20240226-en
6 signatures
150 seconds
General
-
Target
c8881bba97172d64a981a2b0836f9a69.exe
-
Size
29KB
-
MD5
c8881bba97172d64a981a2b0836f9a69
-
SHA1
f38439db49558732ff7227ae7e4f66de94c88eec
-
SHA256
6b8f6c82bee78d34ad09811984c74d5fe82b4c8bf854f5d0a796e9d44efb86bb
-
SHA512
3b06a590658d859521c5205fba51e8ba1e0b08ae641b30d761e54ae71f67fdc561eb9daf4c8d0e10e111557e9967562558834ca0216fb59e266ab5e5e99f1ca3
-
SSDEEP
768:Il0K9XWkID5El01LM2m7kojZ2NnoanFG45nXcrgGWbz6aDcz:w0SGl9USAQWZ+F3lgz
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2992-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2992-1-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2616-3-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2616-4-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2616-8-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HI3v6B10.exe c8881bba97172d64a981a2b0836f9a69.exe File opened for modification C:\Windows\SysWOW64\HI3v6B10.exe c8881bba97172d64a981a2b0836f9a69.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2720 2616 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2616 2992 c8881bba97172d64a981a2b0836f9a69.exe 28 PID 2992 wrote to memory of 2616 2992 c8881bba97172d64a981a2b0836f9a69.exe 28 PID 2992 wrote to memory of 2616 2992 c8881bba97172d64a981a2b0836f9a69.exe 28 PID 2992 wrote to memory of 2616 2992 c8881bba97172d64a981a2b0836f9a69.exe 28 PID 2616 wrote to memory of 2720 2616 c8881bba97172d64a981a2b0836f9a69.exe 29 PID 2616 wrote to memory of 2720 2616 c8881bba97172d64a981a2b0836f9a69.exe 29 PID 2616 wrote to memory of 2720 2616 c8881bba97172d64a981a2b0836f9a69.exe 29 PID 2616 wrote to memory of 2720 2616 c8881bba97172d64a981a2b0836f9a69.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8881bba97172d64a981a2b0836f9a69.exe"C:\Users\Admin\AppData\Local\Temp\c8881bba97172d64a981a2b0836f9a69.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\c8881bba97172d64a981a2b0836f9a69.exe"C:\Users\Admin\AppData\Local\Temp\c8881bba97172d64a981a2b0836f9a69.exe" y±²³2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 2403⤵
- Program crash
PID:2720
-
-