Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
Downloads.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Downloads.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
malwaretest.bat
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
malwaretest.bat
Resource
win10v2004-20240419-en
General
-
Target
Setup.exe
-
Size
6.2MB
-
MD5
b4bf098c6c8ec941f7a1dde3789f65bc
-
SHA1
cceac8c47843d1097ba36cdea2540abaa591ecfa
-
SHA256
e1a094176491255c48e5220db3f97b160532bf90abca149c767a4cfb6e6e1ed5
-
SHA512
824d1dcfcdcbaf2afda198c3c9ad7f2e26644deaaed54e7f3c1ac2a5d2e3ce8caefb8d9356c2370225ae5659017924d21ad85b2fdcea5285c7fb63d9765593c9
-
SSDEEP
98304:nuJTxaQvnSEnz6JOyFhK/axXA+VdwVHBSK6FCExd+iXKcigylBSxrKugYWXWw:nuJTTwHF+axXA+VdwZyCAKgkBAKrWw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2872 Setup.tmp -
Loads dropped DLL 5 IoCs
pid Process 2300 Setup.exe 2872 Setup.tmp 2872 Setup.tmp 2872 Setup.tmp 2872 Setup.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2872 Setup.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2872 2300 Setup.exe 28 PID 2300 wrote to memory of 2872 2300 Setup.exe 28 PID 2300 wrote to memory of 2872 2300 Setup.exe 28 PID 2300 wrote to memory of 2872 2300 Setup.exe 28 PID 2300 wrote to memory of 2872 2300 Setup.exe 28 PID 2300 wrote to memory of 2872 2300 Setup.exe 28 PID 2300 wrote to memory of 2872 2300 Setup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\is-R2CKN.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-R2CKN.tmp\Setup.tmp" /SL5="$70122,5902719,227840,C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2872
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294KB
MD5336b561714280385c771b7359cc2fb51
SHA16136cf4e6286960a80f840695108747ec70a4829
SHA25624aa776e0437e60ae0c7877c7a26f4816deb22a900507cf6e467010dcf9e5ba6
SHA512291c76be891cd1c69c12e5b601038acb69617c3c0b146292cb57c8d5161bf839dc56c336ba96fa72aacca98f295f71bc4b32890bea90e7e13a74f58e6cc957a6
-
Filesize
65KB
MD5185d31c702a861fd7026c693513eb3fb
SHA14857cba77bce860ee34df70d2ed06ac51958b53f
SHA25656e1b926b344ef760fea6a4fd862e066ea5295f7e5671fc7c0d1f1bc148e2009
SHA5129cabac5d73a9dada0d809fdfbbb552c105d0de975a545fef70322b8c86b001691af6e2dc58e980343342a953bed12d91553dc253928cd6357836b6aaf5efb8e4
-
Filesize
9KB
MD591f97aa4b051e7b2991e5456d2c8655b
SHA1901dd406613f3e97d8d6141bb061b242a3b5fb4f
SHA2560ff3fbfbb177d5ffc8b577f821a91f9d39f13f5f548f9570c12cb85ccef526e3
SHA512b664f7aff75308d416c9e479bbd9a9b840816d41fb1dc218187c01636e443c4c7976a635459f626f971961c89d0b8e3c91bb0d61940e487a36179437fb0aa296
-
Filesize
22KB
MD53a104b9ff4b59bba6dc3b30114c5b31b
SHA13a03ebe2b3ff5d4bac88355c82a86da3bb30cfde
SHA2561a72008c2393b330c3a9e05bcba070e538d9d5078767adc49a86a05473226ced
SHA5128d4d985d5003b2b7739c9f5549b8ea143adcfa78188fea45de49a73f82dd1e88709ef35a62bdcfdf360a1d3face0cb40fb8ff782d15f5081127dd6121a7e0289
-
Filesize
294KB
MD5a50d1284b3709220da74209e11bb0758
SHA1946f94b81bbb6c6a872d454eef5a761bd8a0364e
SHA256b8d131cbb9fcf5369fb728c16d21bd30f1760e0e647b38cd676d25e7270ecc46
SHA51228fe1a424da12e18b9373aab640aa0cc43cd7447ce32612f5a94832793d2afb8472d5ab9061e5704cd09e1848e3f6e041ea6336c4231212213b44a7202f96e6c
-
Filesize
77KB
MD5f5f4fe2b811e5a07ae1184579cf36557
SHA19ae1594e259f1aa06734c8653796596113f2d08b
SHA256d66bbf3a8d5f5890c3dbc95e77068abb10f3db4ebd0c71ae5dbf15d99174889c
SHA512eded97ed79f84916e5727f83e170f3999478df537bebe39767c49a3bedf4c86cd5bc3dcfd5d767559b9333ce9e06bddeceb96469e5a70eaae47145a838438f56
-
Filesize
294KB
MD5fa864d2e07ba7811638d5a07152f3277
SHA156734493764e6dbd9871e1bdad6222ea97f45eba
SHA256fc36ef1c5559899c2c2e752cff7bc9408dafd6ba126ec51c2be859d5a44919a4
SHA51242a87178b3000c8a28a6a1880d762b4b7e65213c04ceca5ef8ec9b52cba0be6970d4aeef909c3b9b48fa39688390460ce3d4faf099f13370e669865ebf5b6f25
-
Filesize
12KB
MD5688231d073c8260004d860b29726e589
SHA133ef340a8671fe0b74cab319e7c3f2a197eb6c3e
SHA25681ddf630398427b4d81e15b6feb595669d06923a5e95954cb36a442d7f0e26c3
SHA51294aa5fbede7d9da05b8216c2cf451e927edbcc0f8808f89fb3ce612870e849836d2df477c9630358b92bead596d2a900fe1879b3c99fdd630a4c8cecbf5f6a6a
-
Filesize
9KB
MD51dbec7e15bb3fe912ea362c7f5305cb8
SHA18ee2dca3f834cd7809dd50681bb432fa17f982f6
SHA25643bfe50a575e87237abe4f65eee18b23e667c0a6c9fa1fd6fc2176948edfa527
SHA512dc46536df17a17410a4aa2b6afaee9a620612e23498d009e766411bf2d17c87da0ac3b3f5a950375c34f4355f6b2924dfdc99c52102e1e702fd55f29333fc55f
-
Filesize
26KB
MD5a5ba8ba0b1985ca8f6d2d8bc3ff1f09f
SHA1e198a54f426d139bd19a836502dd226d83973f8f
SHA2561f6fec81aae4f62d18b834e1fc634603882155b23d6d5825b786ee9dbf9ddf3d
SHA512e457b152f85611b49ab3270ac524e1e957a24570ac036e570b45d892652890bb94fee98700898d55cf31d5f5f47ee1bfd1e3acf03875edd7db5ef94395e70181
-
Filesize
452KB
MD54feafa8b5e8cdb349125c8af0ac43974
SHA17f17e5e1b088fc73690888b215962fbcd395c9bd
SHA256bb8a0245dcc5c10a1c7181bad509b65959855009a8105863ef14f2bb5b38ac71
SHA512d63984ee385b4f1eba8e590d6de4f082fb0121689295ec6e496539209459152465f6db09e6d8f92eec996a89fc40432077cbfa807beb2de7f375154fef6554bc
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
37KB
MD5619bf9ddcb5fe39ee9e5b0167e7f4f0d
SHA16da8c0d2407d5221172765b00452efa0f361902f
SHA256609661a14733f6e9c2c2f2ff9c274f8a4cbedaff4dd32049aa5161f8d7083d6a
SHA512a89fc731805e83f889f408fe3fea769d0e44faf1e1dd37d3569bbf57a6086b1ffc8783778e0be8236447c7661c44051b2d4b1d3a643f7ebc35f6ef0625c6897a
-
Filesize
1.5MB
MD56e4e83302159ec46e10280abe1d62ce1
SHA1eb439d7b73e64605eb9f37b9b057722861ada267
SHA256bb22238b9de45d10013cdf18b66d13646137bf5ddc075c781a160ef8739b2fd7
SHA51222331088377154be8b11825c95c1a2a8765d71c3394714faed00a6185ab84afac63ae95103f20f1a9e4fe447259976734e1bd905e4a45bbe0567cee5241f1033