Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3Visual V.3...V3.txt
windows7-x64
1Visual V.3...V3.txt
windows10-2004-x64
1Visual V.3/README.txt
windows7-x64
1Visual V.3/README.txt
windows10-2004-x64
1Visual V.3...V3.exe
windows7-x64
7Visual V.3...V3.exe
windows10-2004-x64
7eee.pyc
windows7-x64
3eee.pyc
windows10-2004-x64
3Visual V.3...on top
windows7-x64
1Visual V.3...on top
windows10-2004-x64
1Analysis
-
max time kernel
14s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 10:21
Behavioral task
behavioral1
Sample
Visual V.3/About Visual/Whats new in Visual V3.txt
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Visual V.3/About Visual/Whats new in Visual V3.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Visual V.3/README.txt
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Visual V.3/README.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Visual V.3/Visual V3.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
Visual V.3/Visual V3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
eee.pyc
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
eee.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Visual V.3/visual on top
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Visual V.3/visual on top
Resource
win10v2004-20240426-en
General
-
Target
Visual V.3/Visual V3.exe
-
Size
57.7MB
-
MD5
de92a9f665793bdb1dd3a7fbe90416b3
-
SHA1
af2f5c71577b6a5e0a1a525093494b8b1e7f232c
-
SHA256
585da5aa8a98e1ffdde176d2a569b8e594ae3873d1b3da7f5ffdb13f9cda6618
-
SHA512
b6a110a278bad9526317838b3fcc4aef380496543435ca214dcee794a6838da191ae573056bb3ab115ac18f72035ac917b97f0ac4c9ca0c7bf9538a1e8b608dd
-
SSDEEP
1572864:uRWqXGMK4XR3bLSCU/+6yPlhvhSDiIl2qHWB75iVf6JCUCh:uUqgYRPSC++6y9JkLl2qHO5iVf6J3Ch
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 868 Visual V3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2460 wrote to memory of 868 2460 Visual V3.exe 28 PID 2460 wrote to memory of 868 2460 Visual V3.exe 28 PID 2460 wrote to memory of 868 2460 Visual V3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Visual V.3\Visual V3.exe"C:\Users\Admin\AppData\Local\Temp\Visual V.3\Visual V3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Visual V.3\Visual V3.exe"C:\Users\Admin\AppData\Local\Temp\Visual V.3\Visual V3.exe"2⤵
- Loads dropped DLL
PID:868
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD53c388ce47c0d9117d2a50b3fa5ac981d
SHA1038484ff7460d03d1d36c23f0de4874cbaea2c48
SHA256c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb
SHA512e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35