Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 08:43

General

  • Target

    caf8c2ee0760aab369ee7f3ab61ccd26.exe

  • Size

    82KB

  • MD5

    caf8c2ee0760aab369ee7f3ab61ccd26

  • SHA1

    4a9a3019a5df74f9637775dad7d341f21464240e

  • SHA256

    1e645f7d8b51d3d61674686eb393206f20b4ffa93356d31fd909638389d1ea0c

  • SHA512

    83a6a2cf7e8bba922a12b3e8a430e5db1e092148e4b08faba5f8055052b882c652682489acff78ef25920024dd52e44bfe6e7d08fdf6af260752806b7fc71390

  • SSDEEP

    1536:YE/BsC3LLVMRPOnZdEW+WT6WGH4ar74Qdzbo2Qgro55FhrP+KkZz:xpsDRPONjT6Wc75IgrCrzkZz

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\caf8c2ee0760aab369ee7f3ab61ccd26.exe
    "C:\Users\Admin\AppData\Local\Temp\caf8c2ee0760aab369ee7f3ab61ccd26.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Users\Admin\AppData\Local\Temp\caf8c2ee0760aab369ee7f3ab61ccd26.exe
      C:\Users\Admin\AppData\Local\Temp\caf8c2ee0760aab369ee7f3ab61ccd26.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2536

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\caf8c2ee0760aab369ee7f3ab61ccd26.exe

    Filesize

    82KB

    MD5

    f30d661d516539e4278d9424aa912346

    SHA1

    fd640e23398470d1ec5387ca9b8d45113ae528f1

    SHA256

    35c8ef8046b940decbfd62f01f0f4e46dbe4e004e49c7952eae415993cc2000f

    SHA512

    59bb85b362e0f3463fdb0ca06c3d7bc5b0873e2b2672742b201840555560667b71b4169335d98605765e35d65c4d051d57ab5211d39c59bb7bf17ebe9133cec4

  • memory/1488-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1488-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1488-3-0x0000000000140000-0x000000000016F000-memory.dmp

    Filesize

    188KB

  • memory/1488-15-0x0000000000190000-0x00000000001BF000-memory.dmp

    Filesize

    188KB

  • memory/1488-14-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2536-17-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2536-20-0x0000000000140000-0x000000000016F000-memory.dmp

    Filesize

    188KB

  • memory/2536-24-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2536-26-0x00000000001A0000-0x00000000001BB000-memory.dmp

    Filesize

    108KB