Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/03/2024, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe
Resource
win10v2004-20240226-en
General
-
Target
df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe
-
Size
448KB
-
MD5
d74ce8888ccc03c210234659280d33d1
-
SHA1
56a17ff5e35ada24b6f00b532d35e42fdf5fb2ea
-
SHA256
df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc
-
SHA512
f794a9ae5ab37aa1fd03a98cd8f95dc9ad28abaad075aff412388c39b147dd34be4a70158f8532379ef467e81b6088f7365eaad9d373c4d07f8a6e3e0de742f1
-
SSDEEP
6144:FC1cS7d3WpYSgwCyGH6Y660W7cyqCxSngmMBqfycuPbUl0i5cD5J6K1mxA:01B5S/Cyfi0npM4dl0v5JdmA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2208 df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe -
Executes dropped EXE 1 IoCs
pid Process 2208 df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe -
Loads dropped DLL 1 IoCs
pid Process 2400 df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2208 df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2400 df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2208 df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2208 2400 df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe 28 PID 2400 wrote to memory of 2208 2400 df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe 28 PID 2400 wrote to memory of 2208 2400 df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe 28 PID 2400 wrote to memory of 2208 2400 df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe"C:\Users\Admin\AppData\Local\Temp\df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exeC:\Users\Admin\AppData\Local\Temp\df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2208
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\df2c19d0287793d0d107bfae824c46040ded018e5c6ff80ee0262d92ab817edc.exe
Filesize448KB
MD59b24ea32a7d29f26f7c5821070fd52df
SHA16e11364b0f943b11f0d824d3049b7e8114b993a2
SHA256d963e4f0636b9f2b3358c208d73317e7f213d04ee27ea88a482f048aa9543c11
SHA512a6262f136dc4800b78d17ae3f40baa42a01fce9287d832ff0d6571ce5e155615fda25073f75c09c76c9878329acce2c481b903be1d8828fc5d40dbabcf0927d7