Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe
Resource
win10v2004-20240226-en
General
-
Target
d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe
-
Size
79KB
-
MD5
621b230cc625b651f3e854399b25ace6
-
SHA1
a2dc0ead824fdd894cb4326908cb2d74b7df51d5
-
SHA256
d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f
-
SHA512
2e3efa4597837ad4fa65cb3943f7f2e5f5943d3529f3849f95ec11b28548a385f8d6c9060f999af37ebdd8b531636aec23a26b785da7f95d59601caf87da498d
-
SSDEEP
1536:zvQFxWrhuqoWnMxOQA8AkqUhMb2nuy5wgIP0CSJ+5yAB8GMGlZ5G:zvQFx/0MAGdqU7uy5w9WMyAN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2936 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2684 cmd.exe 2684 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2684 1704 d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe 29 PID 1704 wrote to memory of 2684 1704 d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe 29 PID 1704 wrote to memory of 2684 1704 d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe 29 PID 1704 wrote to memory of 2684 1704 d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe 29 PID 2684 wrote to memory of 2936 2684 cmd.exe 30 PID 2684 wrote to memory of 2936 2684 cmd.exe 30 PID 2684 wrote to memory of 2936 2684 cmd.exe 30 PID 2684 wrote to memory of 2936 2684 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe"C:\Users\Admin\AppData\Local\Temp\d4d7283c8c1817e7973eb5ce47751456366302b3ea95878cf23fee59d23d120f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2936
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD520f729bcad3f1c104221dc0088c2c604
SHA1a5355620f7e85c976fdbdbbec0df853e5f72012e
SHA256cd5c0f83d2a809ce1ad3a093f4f532bcb465d94fc3608f417762bccb999cf985
SHA5120aa327dd74278d5190b0fea91a358bb474b15c6c6c43b36453829c29c000d90d23ed15fdf6c9a0b4b9686d51127ea52afc27429810c4de4dc7020e8020f843ac