Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 02:34
Behavioral task
behavioral1
Sample
ca43a44ce6383427ed75dbdfee0a3bda.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca43a44ce6383427ed75dbdfee0a3bda.exe
Resource
win10v2004-20240226-en
General
-
Target
ca43a44ce6383427ed75dbdfee0a3bda.exe
-
Size
3.9MB
-
MD5
ca43a44ce6383427ed75dbdfee0a3bda
-
SHA1
f7276d83ced99f9d4c12d20c2ea56c9d0287003e
-
SHA256
4b228826b48d7df73593874662ae2fe84ae90a739d6dce21700f69ace9f88b35
-
SHA512
7b56f79deedd10529a9eb84eeaa0ce64e06e7e57f5e846c7222f1d6476f6d51860e784e39a908652fa51cac1400e9d5220e420c121700ca118de36dc471448f9
-
SSDEEP
98304:gW7CofVMAgg3gnl/IVUt4pJWzZtIygg3gnl/IVUV:F7NV5gl/iwgWttJgl/iG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2540 ca43a44ce6383427ed75dbdfee0a3bda.exe -
Executes dropped EXE 1 IoCs
pid Process 2540 ca43a44ce6383427ed75dbdfee0a3bda.exe -
Loads dropped DLL 1 IoCs
pid Process 2312 ca43a44ce6383427ed75dbdfee0a3bda.exe -
resource yara_rule behavioral1/memory/2312-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000800000001225f-10.dat upx behavioral1/files/0x000800000001225f-12.dat upx behavioral1/files/0x000800000001225f-13.dat upx behavioral1/memory/2540-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2312 ca43a44ce6383427ed75dbdfee0a3bda.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2312 ca43a44ce6383427ed75dbdfee0a3bda.exe 2540 ca43a44ce6383427ed75dbdfee0a3bda.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2540 2312 ca43a44ce6383427ed75dbdfee0a3bda.exe 28 PID 2312 wrote to memory of 2540 2312 ca43a44ce6383427ed75dbdfee0a3bda.exe 28 PID 2312 wrote to memory of 2540 2312 ca43a44ce6383427ed75dbdfee0a3bda.exe 28 PID 2312 wrote to memory of 2540 2312 ca43a44ce6383427ed75dbdfee0a3bda.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca43a44ce6383427ed75dbdfee0a3bda.exe"C:\Users\Admin\AppData\Local\Temp\ca43a44ce6383427ed75dbdfee0a3bda.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\ca43a44ce6383427ed75dbdfee0a3bda.exeC:\Users\Admin\AppData\Local\Temp\ca43a44ce6383427ed75dbdfee0a3bda.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2540
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5fd98d71675abd185b49b7e3ca6786082
SHA175be964e03ab6470d3a30977d0c86b36c0da029a
SHA256511a1c205acb6b64248127b08e72592bf3e9b0c6c23af5f3186472a406bc17a4
SHA512deff4a2c52d2cf037f58b2f841b6c5d01bf975638b618702fcf3390bb41804e92512756462719d3de51c265b75f136c273ba95d819711df1367d77b05d58ce9a
-
Filesize
1.1MB
MD52e078498ac6c9b04422e126e864dd1b0
SHA1776f06f39c814d86f3cb9f20e8a1c6db66c75fba
SHA2568a266b9403a9d3a11e601f061ed5ecd54382cfa60c4f7faf7435f90d67451bdb
SHA512ff49c0226c267cb4a536ab5bfbe835301151a86287f99c5b82e3fddb2ff004f1446dadd829fbbcb45dd1fb337f51f09985de655396940fc376b1bf703c618f4e
-
Filesize
1.6MB
MD5dd444013fe39f76f359201e4ae4f9316
SHA16b43379bbf93bb3082286f446b453d9e0e97d65c
SHA256636576e72b096c38cede4ca78bcfdea0d948e6040caa061f215c91a6f4336b57
SHA512c0010cdd0fa0e9f38ba3fdd04b8f1be73bb2e64ed6a2c6d25deea4d910d641e4ee9cb3dd062e0f4745d19dae6fd494082dd342c29508177f476682bd5db462e1