Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 18:10
Static task
static1
Behavioral task
behavioral1
Sample
0266a726e99d1c7b0b97a6b5425269e2f568679da6c643742fba992e63c0d156.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0266a726e99d1c7b0b97a6b5425269e2f568679da6c643742fba992e63c0d156.exe
Resource
win10v2004-20240419-en
General
-
Target
0266a726e99d1c7b0b97a6b5425269e2f568679da6c643742fba992e63c0d156.exe
-
Size
4.2MB
-
MD5
b97ca63c41820e651ef8fecdc4e8dfe4
-
SHA1
d2b0267e3d1c50c5b99e61da7a470ab445796b6d
-
SHA256
0266a726e99d1c7b0b97a6b5425269e2f568679da6c643742fba992e63c0d156
-
SHA512
6e75f59df8561166a8d579f1d2ba648b3ff2d2ccf843c2a4de407347ab14fd892c7e6bdd8c0f92b42760a047e826b48f42eece21b5dc26b4c88e50c559898735
-
SSDEEP
98304:Cmhd1Urye0X/2yfjNVLUjH5oxFbxhVLUjH5oxFbx:ClC/2yBVUjZEdhVUjZEd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1628 17C5.tmp -
Executes dropped EXE 1 IoCs
pid Process 1628 17C5.tmp -
Loads dropped DLL 2 IoCs
pid Process 2100 0266a726e99d1c7b0b97a6b5425269e2f568679da6c643742fba992e63c0d156.exe 2100 0266a726e99d1c7b0b97a6b5425269e2f568679da6c643742fba992e63c0d156.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1628 2100 0266a726e99d1c7b0b97a6b5425269e2f568679da6c643742fba992e63c0d156.exe 28 PID 2100 wrote to memory of 1628 2100 0266a726e99d1c7b0b97a6b5425269e2f568679da6c643742fba992e63c0d156.exe 28 PID 2100 wrote to memory of 1628 2100 0266a726e99d1c7b0b97a6b5425269e2f568679da6c643742fba992e63c0d156.exe 28 PID 2100 wrote to memory of 1628 2100 0266a726e99d1c7b0b97a6b5425269e2f568679da6c643742fba992e63c0d156.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0266a726e99d1c7b0b97a6b5425269e2f568679da6c643742fba992e63c0d156.exe"C:\Users\Admin\AppData\Local\Temp\0266a726e99d1c7b0b97a6b5425269e2f568679da6c643742fba992e63c0d156.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\17C5.tmp"C:\Users\Admin\AppData\Local\Temp\17C5.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0266a726e99d1c7b0b97a6b5425269e2f568679da6c643742fba992e63c0d156.exe E4D5406921D73D6D9A11893CB2677C9DB153A392C3937F645EFC73A74F881B2D6755E2819CD51C17828BB2F1291B25044CAF24F64664650AE1519C783B2050E42⤵
- Deletes itself
- Executes dropped EXE
PID:1628
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD58ea54193a32e65ec656bffa7fc656208
SHA1e58dcaad0c44563e28424bab0a5367eceda1d18d
SHA256be65f10daae48e5dc465d7e751075af3b3b3654f3dcea24ed47986a4879eba01
SHA512193d497e70625df11a98898e8959291c2a5082a28dce24365aa55e237facbc94c993dc53fb39cfd8881cb4e47b0c11223604e959c20dcf52f69940d8361fe2ec