Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 02:20
Behavioral task
behavioral1
Sample
e0896bc5b3cee2fa264b25f70c883294.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e0896bc5b3cee2fa264b25f70c883294.exe
Resource
win10v2004-20231215-en
General
-
Target
e0896bc5b3cee2fa264b25f70c883294.exe
-
Size
2.7MB
-
MD5
e0896bc5b3cee2fa264b25f70c883294
-
SHA1
cddcef82dad6d0a8d2aa771b30191464cfd24006
-
SHA256
6eee158a3739c38786245f8afb491d92591eb5616dfbe898607fa35bc645f33c
-
SHA512
a7a2cfc630b5c6ff3cb0e4e934a1715d48f8d6a76977f47b3d704a7d92658a1dd6a52ec51d9f71073c4242b0c870de6930845311e70d76879cad1de14e919782
-
SSDEEP
49152:qokRSNkL2CZwsqFN1OYn0TbbuPvR9TJdlB4011X3rTEK4lhVMqJtKZJhJX9HR9j:qDwkLhOLFvOxTsHTJdzz1HrYK4nm6+Jx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2924 e0896bc5b3cee2fa264b25f70c883294.exe -
Executes dropped EXE 1 IoCs
pid Process 2924 e0896bc5b3cee2fa264b25f70c883294.exe -
Loads dropped DLL 1 IoCs
pid Process 2868 e0896bc5b3cee2fa264b25f70c883294.exe -
resource yara_rule behavioral1/memory/2868-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x000a000000012252-10.dat upx behavioral1/memory/2924-16-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2868 e0896bc5b3cee2fa264b25f70c883294.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2868 e0896bc5b3cee2fa264b25f70c883294.exe 2924 e0896bc5b3cee2fa264b25f70c883294.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2924 2868 e0896bc5b3cee2fa264b25f70c883294.exe 28 PID 2868 wrote to memory of 2924 2868 e0896bc5b3cee2fa264b25f70c883294.exe 28 PID 2868 wrote to memory of 2924 2868 e0896bc5b3cee2fa264b25f70c883294.exe 28 PID 2868 wrote to memory of 2924 2868 e0896bc5b3cee2fa264b25f70c883294.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0896bc5b3cee2fa264b25f70c883294.exe"C:\Users\Admin\AppData\Local\Temp\e0896bc5b3cee2fa264b25f70c883294.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\e0896bc5b3cee2fa264b25f70c883294.exeC:\Users\Admin\AppData\Local\Temp\e0896bc5b3cee2fa264b25f70c883294.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2924
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5f6556c88fc496e25456c7975b8a688b2
SHA16815e29d8483b8671b25d68507f7604f2bfae6a1
SHA25697682aff4698f48e5c7a2360625ca27b791e8ff1215535fb4f5c7ccc2a9c2477
SHA5125ae9d3756e8288110f5fcb781108badac4331a5d32cfb98daaca65e02bfa6b22846675008cc2b8b00d4ab72585e8d2aee4229f64e316aa712435bdae33459598