Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe
Resource
win10v2004-20240226-en
General
-
Target
7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe
-
Size
796KB
-
MD5
7b114e918bb53fffaf73330065c57b7e
-
SHA1
872fd024275393cbd41425883950c912d9700680
-
SHA256
7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f
-
SHA512
dffedadb3f01f8ad2af00e0d7a85779cbfbe46daab25d6f7006c190bbe9bbc6323ea56aed36ca3f741ffeb9983c1940e2b42885ad8b8b7160ad5500f67ab498a
-
SSDEEP
12288:TJz0eysF3ikNgyhk+YC4DqEfFX4UWRfR50kFiGcSroPX/h4j3depPu1P4Jxf+:TJz0Q32wktqgHWvGNpPXZ4j3depPuYk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1932 1C0C0C0A120F156D155C15B0F0D160D0C160B.exe -
Loads dropped DLL 2 IoCs
pid Process 328 7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe 328 7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 328 7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe 1932 1C0C0C0A120F156D155C15B0F0D160D0C160B.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 328 wrote to memory of 1932 328 7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe 28 PID 328 wrote to memory of 1932 328 7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe 28 PID 328 wrote to memory of 1932 328 7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe 28 PID 328 wrote to memory of 1932 328 7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe"C:\Users\Admin\AppData\Local\Temp\7a369aa1e4b06cd67416ca439da0c414d7c743d7f39246c7948cde6cbd0daf2f.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Local\Temp\1C0C0C0A120F156D155C15B0F0D160D0C160B.exeC:\Users\Admin\AppData\Local\Temp\1C0C0C0A120F156D155C15B0F0D160D0C160B.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1932
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
796KB
MD5fa8b2c74b7ebb45919235832728f26e6
SHA1ef45b285a2338c13fa5d9178b8b678068b457e9b
SHA25683d429ea24fb9a899af11f3ef686f8041a253f8b363399a4747bc4322e7fd8e8
SHA512471d34c2c01c366cbecf51d7504612208fec156739ff66a74ce50bf25f06c4162e47b570bf5cc0efd26193708016167cb439897db9d48a45a6c3d2082fc81623