Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
d3518ba0fd126c08a6b6b27645ecfdcfa9fdef8ef6d4d79dbcf392649353cb36.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d3518ba0fd126c08a6b6b27645ecfdcfa9fdef8ef6d4d79dbcf392649353cb36.exe
Resource
win10v2004-20240412-en
General
-
Target
d3518ba0fd126c08a6b6b27645ecfdcfa9fdef8ef6d4d79dbcf392649353cb36.exe
-
Size
5.4MB
-
MD5
f71dddcfc403778909d8001632e3a62b
-
SHA1
eeecf5034e09ab94a075cbff59e737ac17d5bd02
-
SHA256
d3518ba0fd126c08a6b6b27645ecfdcfa9fdef8ef6d4d79dbcf392649353cb36
-
SHA512
3b0f158523d148434e0c92f334757db2c3265b0967be8637e0f19e858f451c21f14a1665dcb12fcdc672f4f58869398862105911f803aa72c03ce504f1107772
-
SSDEEP
98304:emhd1Urye9zjQbxePjIubwSS/Ae6kWvicV7wQqZUha5jtSyZIUh:eldzj4xeP8l/j46c2QbaZtliU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1812 52F.tmp -
Executes dropped EXE 1 IoCs
pid Process 1812 52F.tmp -
Loads dropped DLL 2 IoCs
pid Process 2168 d3518ba0fd126c08a6b6b27645ecfdcfa9fdef8ef6d4d79dbcf392649353cb36.exe 2168 d3518ba0fd126c08a6b6b27645ecfdcfa9fdef8ef6d4d79dbcf392649353cb36.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1812 2168 d3518ba0fd126c08a6b6b27645ecfdcfa9fdef8ef6d4d79dbcf392649353cb36.exe 28 PID 2168 wrote to memory of 1812 2168 d3518ba0fd126c08a6b6b27645ecfdcfa9fdef8ef6d4d79dbcf392649353cb36.exe 28 PID 2168 wrote to memory of 1812 2168 d3518ba0fd126c08a6b6b27645ecfdcfa9fdef8ef6d4d79dbcf392649353cb36.exe 28 PID 2168 wrote to memory of 1812 2168 d3518ba0fd126c08a6b6b27645ecfdcfa9fdef8ef6d4d79dbcf392649353cb36.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3518ba0fd126c08a6b6b27645ecfdcfa9fdef8ef6d4d79dbcf392649353cb36.exe"C:\Users\Admin\AppData\Local\Temp\d3518ba0fd126c08a6b6b27645ecfdcfa9fdef8ef6d4d79dbcf392649353cb36.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\52F.tmp"C:\Users\Admin\AppData\Local\Temp\52F.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d3518ba0fd126c08a6b6b27645ecfdcfa9fdef8ef6d4d79dbcf392649353cb36.exe 24F02AC6363F4AFCE72C42E3EE25C6D32A9FA0BB564B72D690F512D3B1608135B8C01E2393987C3CD732A4E70D32DBB2A0D7D27F9E47998E6CD3B76136053CB42⤵
- Deletes itself
- Executes dropped EXE
PID:1812
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD5237cefadb6bae3ab971f38821e38119b
SHA1c4f8e8bbd75d473fe81c796b8f81e2fe0641ec69
SHA256f3fb0482f8b43eef8912de080dc189f2579952f13c4bb39defddafd1ac822ebe
SHA51207cc8ebd7420e8b095399f14f9cea27a1f724224ca507915c764f97499d82e0a0bd66c3d94441c8f30272954ea2f4a7e1339e04dc113c14517e5deee3dab9d4b