Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 12:14
Behavioral task
behavioral1
Sample
e1a4267c475a0a9a2c92e312246e93d1.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e1a4267c475a0a9a2c92e312246e93d1.exe
Resource
win10v2004-20240319-en
General
-
Target
e1a4267c475a0a9a2c92e312246e93d1.exe
-
Size
1.3MB
-
MD5
e1a4267c475a0a9a2c92e312246e93d1
-
SHA1
bb09a7693bc71f759a96659653e1db802e0699a7
-
SHA256
b78d97bb58e7aa39565ebee84b814808482b97dc21926420d09c6ed2a2530303
-
SHA512
3b7b9ebaa0659c6d8b1dacac2732673ce5acc9d0b4f5c03ef2f52b00faacc301455f21a36a0de873aaaa3f096bcbd3670b83be9037afe11e6ee623790a682d32
-
SSDEEP
24576:tLpRbBEIZSWon/RxCroPZe0RcnRdbMfrnRmtmS0HxvG:rRbBEI2n5gAY0RcnbwfrRmy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2180 e1a4267c475a0a9a2c92e312246e93d1.exe -
Executes dropped EXE 1 IoCs
pid Process 2180 e1a4267c475a0a9a2c92e312246e93d1.exe -
Loads dropped DLL 1 IoCs
pid Process 2880 e1a4267c475a0a9a2c92e312246e93d1.exe -
resource yara_rule behavioral1/memory/2880-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000600000001208c-11.dat upx behavioral1/memory/2180-17-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2880 e1a4267c475a0a9a2c92e312246e93d1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2880 e1a4267c475a0a9a2c92e312246e93d1.exe 2180 e1a4267c475a0a9a2c92e312246e93d1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2180 2880 e1a4267c475a0a9a2c92e312246e93d1.exe 28 PID 2880 wrote to memory of 2180 2880 e1a4267c475a0a9a2c92e312246e93d1.exe 28 PID 2880 wrote to memory of 2180 2880 e1a4267c475a0a9a2c92e312246e93d1.exe 28 PID 2880 wrote to memory of 2180 2880 e1a4267c475a0a9a2c92e312246e93d1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1a4267c475a0a9a2c92e312246e93d1.exe"C:\Users\Admin\AppData\Local\Temp\e1a4267c475a0a9a2c92e312246e93d1.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\e1a4267c475a0a9a2c92e312246e93d1.exeC:\Users\Admin\AppData\Local\Temp\e1a4267c475a0a9a2c92e312246e93d1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2180
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53c0356ec7d1d9efadf998cafd05643a7
SHA1a093a9a79a624266d2365fc4f6bc2ba7f5852843
SHA2567f81050af264775360349aff8569ce541b9b2528cb81951674dfe2fa5f558fb6
SHA512a047c65cd2564ffb666cc4cc3a28e577e0366c4fb9c0b582d060f55b0c3b9ae47487b497cd3f147408d4e76d33aa9ca4a6dd312018710cb21d69477c90c9d28a