Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
caf8c2ee0760aab369ee7f3ab61ccd26.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
caf8c2ee0760aab369ee7f3ab61ccd26.exe
Resource
win10v2004-20240226-en
General
-
Target
caf8c2ee0760aab369ee7f3ab61ccd26.exe
-
Size
82KB
-
MD5
caf8c2ee0760aab369ee7f3ab61ccd26
-
SHA1
4a9a3019a5df74f9637775dad7d341f21464240e
-
SHA256
1e645f7d8b51d3d61674686eb393206f20b4ffa93356d31fd909638389d1ea0c
-
SHA512
83a6a2cf7e8bba922a12b3e8a430e5db1e092148e4b08faba5f8055052b882c652682489acff78ef25920024dd52e44bfe6e7d08fdf6af260752806b7fc71390
-
SSDEEP
1536:YE/BsC3LLVMRPOnZdEW+WT6WGH4ar74Qdzbo2Qgro55FhrP+KkZz:xpsDRPONjT6Wc75IgrCrzkZz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2536 caf8c2ee0760aab369ee7f3ab61ccd26.exe -
Executes dropped EXE 1 IoCs
pid Process 2536 caf8c2ee0760aab369ee7f3ab61ccd26.exe -
Loads dropped DLL 1 IoCs
pid Process 1488 caf8c2ee0760aab369ee7f3ab61ccd26.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1488 caf8c2ee0760aab369ee7f3ab61ccd26.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1488 caf8c2ee0760aab369ee7f3ab61ccd26.exe 2536 caf8c2ee0760aab369ee7f3ab61ccd26.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2536 1488 caf8c2ee0760aab369ee7f3ab61ccd26.exe 29 PID 1488 wrote to memory of 2536 1488 caf8c2ee0760aab369ee7f3ab61ccd26.exe 29 PID 1488 wrote to memory of 2536 1488 caf8c2ee0760aab369ee7f3ab61ccd26.exe 29 PID 1488 wrote to memory of 2536 1488 caf8c2ee0760aab369ee7f3ab61ccd26.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\caf8c2ee0760aab369ee7f3ab61ccd26.exe"C:\Users\Admin\AppData\Local\Temp\caf8c2ee0760aab369ee7f3ab61ccd26.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\caf8c2ee0760aab369ee7f3ab61ccd26.exeC:\Users\Admin\AppData\Local\Temp\caf8c2ee0760aab369ee7f3ab61ccd26.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2536
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5f30d661d516539e4278d9424aa912346
SHA1fd640e23398470d1ec5387ca9b8d45113ae528f1
SHA25635c8ef8046b940decbfd62f01f0f4e46dbe4e004e49c7952eae415993cc2000f
SHA51259bb85b362e0f3463fdb0ca06c3d7bc5b0873e2b2672742b201840555560667b71b4169335d98605765e35d65c4d051d57ab5211d39c59bb7bf17ebe9133cec4