Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
d5983ffd31e11152cd8f23c658e85554.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5983ffd31e11152cd8f23c658e85554.exe
Resource
win10v2004-20240226-en
General
-
Target
d5983ffd31e11152cd8f23c658e85554.exe
-
Size
1.9MB
-
MD5
d5983ffd31e11152cd8f23c658e85554
-
SHA1
80d23604807c4ffdbc53716bb96f06a88b428756
-
SHA256
5c441155aebf7815bd3bc256974dbe4ef39f526dd3bcd1b2cc72844658b2a84a
-
SHA512
ce3140eb324e26135e067e47a7f714ed8768afbe7fd7fd536ce1a24b2a767b14e8c575ac001840de96582ee822d13f85ca6c397ecde8b78d99448cf61b16bc2e
-
SSDEEP
49152:Qoa1taC070dpMo0TnMwPRr+iRihMeMDv7:Qoa1taC0ojikhc7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2488 4D26.tmp -
Executes dropped EXE 1 IoCs
pid Process 2488 4D26.tmp -
Loads dropped DLL 1 IoCs
pid Process 2336 d5983ffd31e11152cd8f23c658e85554.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2488 2336 d5983ffd31e11152cd8f23c658e85554.exe 28 PID 2336 wrote to memory of 2488 2336 d5983ffd31e11152cd8f23c658e85554.exe 28 PID 2336 wrote to memory of 2488 2336 d5983ffd31e11152cd8f23c658e85554.exe 28 PID 2336 wrote to memory of 2488 2336 d5983ffd31e11152cd8f23c658e85554.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5983ffd31e11152cd8f23c658e85554.exe"C:\Users\Admin\AppData\Local\Temp\d5983ffd31e11152cd8f23c658e85554.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\4D26.tmp"C:\Users\Admin\AppData\Local\Temp\4D26.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d5983ffd31e11152cd8f23c658e85554.exe DE483EE12DE7AC47A049C983F10709763250E9A7582861B1BAA0BCBB31E468291332B78F2E4DB2251014A46C9BF495718635D6002623BB180D4968FB5DED83872⤵
- Deletes itself
- Executes dropped EXE
PID:2488
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5bafffe11d516f087f825bd48069ff859
SHA1bbbbd665a6226b3313c58636158c7fb862532f0e
SHA256a22a466d59a5f383393f2749034ddd55ed088b3040ca064ac80fb379742146bc
SHA512382c7fc068ef5ee3d06eda6fa50d91065fe69caf802c83d1c1487587c625d5a9f3e7b12992dd670142df8da7380f7eec79a183010f0cbf6fdbed0ea4add4ae4e