Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
cbb9c586550fafb518ffd4567b873fd2.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
cbb9c586550fafb518ffd4567b873fd2.exe
Resource
win10v2004-20240226-en
General
-
Target
cbb9c586550fafb518ffd4567b873fd2.exe
-
Size
82KB
-
MD5
cbb9c586550fafb518ffd4567b873fd2
-
SHA1
2f512c796eae45a183d2240f88b27be3dea426bb
-
SHA256
fdcc7b126a464e016f8865dd149abf16a30065aaebb7770c428d7b48ad9aafbe
-
SHA512
a92f2e203eca0f36271d89110929176fcb2404bacd311e149de1572312e2736c02a95080a16aef77e8b40e12161133fa75bd6fe7f0d7a540bd8cbbf694b61ff0
-
SSDEEP
1536:evxz6PXH12ZT1cpBKArRZRcBHUSRAeHxzE5BIiXB42xf+x:+AV25u6ArRTcBHQbBIieHx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2208 cbb9c586550fafb518ffd4567b873fd2.exe -
Executes dropped EXE 1 IoCs
pid Process 2208 cbb9c586550fafb518ffd4567b873fd2.exe -
Loads dropped DLL 1 IoCs
pid Process 1248 cbb9c586550fafb518ffd4567b873fd2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1248 cbb9c586550fafb518ffd4567b873fd2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1248 cbb9c586550fafb518ffd4567b873fd2.exe 2208 cbb9c586550fafb518ffd4567b873fd2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1248 wrote to memory of 2208 1248 cbb9c586550fafb518ffd4567b873fd2.exe 29 PID 1248 wrote to memory of 2208 1248 cbb9c586550fafb518ffd4567b873fd2.exe 29 PID 1248 wrote to memory of 2208 1248 cbb9c586550fafb518ffd4567b873fd2.exe 29 PID 1248 wrote to memory of 2208 1248 cbb9c586550fafb518ffd4567b873fd2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbb9c586550fafb518ffd4567b873fd2.exe"C:\Users\Admin\AppData\Local\Temp\cbb9c586550fafb518ffd4567b873fd2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\cbb9c586550fafb518ffd4567b873fd2.exeC:\Users\Admin\AppData\Local\Temp\cbb9c586550fafb518ffd4567b873fd2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2208
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5de2ee2600d10c39a4f2da8832af46714
SHA1b720f763361ffb6754a1aa9e097a8c4892ea6696
SHA256a63f0b3ab41842bc3c7499e4a0b31c4fa3be11ac2a708b0c1fbee10fa9115740
SHA512206e8000b18a7867b0b3563b679b5a0ce4ee6f248426c1bfc99402128c6199796fbe7858e3a7b2943be023bab490be6f2ee894b697bbacfb34d8fe9d602e095a