Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe
Resource
win10v2004-20240226-en
General
-
Target
bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe
-
Size
320KB
-
MD5
740bc01ab36a7b6268f6a6bf7a3d1fcc
-
SHA1
a5fe5b21f8391bcbfd0f733b9c4a85d8ae7941e0
-
SHA256
bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e
-
SHA512
0bb297e8809c8da11f2807520fe9e81c93399341cb517c64e348f39cdb1b6c835b1f6a48e5fecf7f6bfd2e1b3d0db6408865f0b0ca34754bec1b342d9615a203
-
SSDEEP
6144:mtDvPrC+HaIucU1UyaKf8VHRRbX53BDu0W7cyqCxSngmMBqfycuPbUl0i5j:+6+0baTvJRxX53p80npM4dl0s
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1828 bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe -
Executes dropped EXE 1 IoCs
pid Process 1828 bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe -
Loads dropped DLL 1 IoCs
pid Process 2992 bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1828 bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2992 bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1828 bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1828 2992 bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe 28 PID 2992 wrote to memory of 1828 2992 bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe 28 PID 2992 wrote to memory of 1828 2992 bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe 28 PID 2992 wrote to memory of 1828 2992 bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe"C:\Users\Admin\AppData\Local\Temp\bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exeC:\Users\Admin\AppData\Local\Temp\bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:1828
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\bbbb6a9747e47b553b8b47593d8ba6a40f248a72524561242224f5d81071cd2e.exe
Filesize320KB
MD5454c606a78c20e94857b7ed6ccea7782
SHA12c5eb5ed179ebeed5d6b7385362b2da3574786cd
SHA2562b1face35cfdd3d2077e2ea1c3718889fc5b57cf93b2ff5188efc4dfe795a457
SHA5129e6d28d2dc44e963eb3e2ae79c73ed3788a3a7f289ed401fed19c6560d129fb1e1512ba43580e50f7d8c91a0586a3b3eb64e0d9a3d31185c340492f76f2d6b6d