Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 23:08
Static task
static1
Behavioral task
behavioral1
Sample
a2f1335f500e96a1081fd44ac6b72f28.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2f1335f500e96a1081fd44ac6b72f28.exe
Resource
win10v2004-20231215-en
General
-
Target
a2f1335f500e96a1081fd44ac6b72f28.exe
-
Size
189KB
-
MD5
a2f1335f500e96a1081fd44ac6b72f28
-
SHA1
d6f4e392a70713947ef6154f6a0acd0600ffa3b8
-
SHA256
07aca79806720586e5dbbc1eba53725c011be7b75fdbff518ecc57e684cde8b3
-
SHA512
bcc998134f7bee994d77ffbe73022cfda5aba2661c2aec099bd006b53b0b76b60a9437b78340319ee59e2e79b8328aad06fbcb9bd61ef7a5a5b50d12b3b6c57e
-
SSDEEP
3072:ftVPX6tSkwHsQQfoTIFa6caOe/t1zj/r/j3O6ZJ3An+PAW9eIhedCyXhCw3BDR:/8Zfmen1nr/j+6b3YW9ego53BDR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2252 a2f1335f500e96a1081fd44ac6b72f28.exe -
Loads dropped DLL 1 IoCs
pid Process 1688 a2f1335f500e96a1081fd44ac6b72f28.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2252 a2f1335f500e96a1081fd44ac6b72f28.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1688 a2f1335f500e96a1081fd44ac6b72f28.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2252 a2f1335f500e96a1081fd44ac6b72f28.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2252 1688 a2f1335f500e96a1081fd44ac6b72f28.exe 28 PID 1688 wrote to memory of 2252 1688 a2f1335f500e96a1081fd44ac6b72f28.exe 28 PID 1688 wrote to memory of 2252 1688 a2f1335f500e96a1081fd44ac6b72f28.exe 28 PID 1688 wrote to memory of 2252 1688 a2f1335f500e96a1081fd44ac6b72f28.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2f1335f500e96a1081fd44ac6b72f28.exe"C:\Users\Admin\AppData\Local\Temp\a2f1335f500e96a1081fd44ac6b72f28.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\a2f1335f500e96a1081fd44ac6b72f28.exeC:\Users\Admin\AppData\Local\Temp\a2f1335f500e96a1081fd44ac6b72f28.exe2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2252
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD535464c509dd32de4b50be681c41bc724
SHA110f3fe216c70294ece6a8b0f0942791b5e450e3a
SHA2564407030f2e778ae090fd22ef32585af272d20f5c98766a5a581d4aac1662e286
SHA512d6d0b4405f6aaeda096090e7ca803c05f0e0720a9f456ab7d61b5fa6657c649446a46536e94fe144c385559a9c8b56933d1b70778c06bc5e9a580e3ecb019af6