Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
d54a32519b34cfb6f3271fbe7e64d36c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d54a32519b34cfb6f3271fbe7e64d36c.exe
Resource
win10v2004-20240226-en
General
-
Target
d54a32519b34cfb6f3271fbe7e64d36c.exe
-
Size
82KB
-
MD5
d54a32519b34cfb6f3271fbe7e64d36c
-
SHA1
f46c09dc804e8cf6e65e337bc94302ef7d908935
-
SHA256
e8ccf056929232c80e409cd1a177fa366a7817fa22b1d7ffd219fdb7541e5be9
-
SHA512
e0a47c45ed37af3ab6123c3a83194cc3a3b7f46089af85b8b8e5da3405dc30183ec2c7dc3365dd4f364c940746daf6dd5392fa8f0128cb9bdb1913fa9a348a5d
-
SSDEEP
1536:u44Z3tmTYHRR5Y8tnamajTStfJQ6SkNtvLf43CMq1yOARKIy:AITURg+afOQ6tNtvizS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2176 d54a32519b34cfb6f3271fbe7e64d36c.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 d54a32519b34cfb6f3271fbe7e64d36c.exe -
Loads dropped DLL 1 IoCs
pid Process 1676 d54a32519b34cfb6f3271fbe7e64d36c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1676 d54a32519b34cfb6f3271fbe7e64d36c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1676 d54a32519b34cfb6f3271fbe7e64d36c.exe 2176 d54a32519b34cfb6f3271fbe7e64d36c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2176 1676 d54a32519b34cfb6f3271fbe7e64d36c.exe 29 PID 1676 wrote to memory of 2176 1676 d54a32519b34cfb6f3271fbe7e64d36c.exe 29 PID 1676 wrote to memory of 2176 1676 d54a32519b34cfb6f3271fbe7e64d36c.exe 29 PID 1676 wrote to memory of 2176 1676 d54a32519b34cfb6f3271fbe7e64d36c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d54a32519b34cfb6f3271fbe7e64d36c.exe"C:\Users\Admin\AppData\Local\Temp\d54a32519b34cfb6f3271fbe7e64d36c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\d54a32519b34cfb6f3271fbe7e64d36c.exeC:\Users\Admin\AppData\Local\Temp\d54a32519b34cfb6f3271fbe7e64d36c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2176
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD54d057959c731e9346fc700f268b5ecde
SHA1b3de8174b173a119d0a194713995b237159ff087
SHA256a53fb94697fd9cf8b04bf255d1bd2e38816295462fe2c6c5064ddf7448b86138
SHA51226b28f882d38b8e833bcb936f3736018f703b73ad603480489e2b491f234665e4b8c33588d7fdddfe363432d4181e5f61c5fae971a7633659714ecac678e5329