Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 02:44
Static task
static1
Behavioral task
behavioral1
Sample
cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe
Resource
win10v2004-20240426-en
General
-
Target
cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe
-
Size
425KB
-
MD5
5000f4e125d49a79a0bacbd69d450bd5
-
SHA1
3cae31889a29111a373a12c8da34c8c474ff2f45
-
SHA256
cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52
-
SHA512
d1561f3d0d027f4c605ed5610e054cca8bd487cd7b7a2210c74791792923a8b713690767653ed9974ed5ec6d5a214f67fdc0c5a9f25759500096c341aa95b1de
-
SSDEEP
12288:Xedc6GRnHhWc1+Lj1f1C+ffZMcQUZn2qhg2kD44zzrGEPVQ:ua6gHhWc1+Lj1f1C+ffZMcQUZn2qhg2P
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1152 cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe -
Executes dropped EXE 1 IoCs
pid Process 1152 cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe -
Loads dropped DLL 1 IoCs
pid Process 3024 cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1152 cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3024 cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1152 cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1152 3024 cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe 28 PID 3024 wrote to memory of 1152 3024 cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe 28 PID 3024 wrote to memory of 1152 3024 cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe 28 PID 3024 wrote to memory of 1152 3024 cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe"C:\Users\Admin\AppData\Local\Temp\cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exeC:\Users\Admin\AppData\Local\Temp\cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:1152
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\cc072f86c9f81277d1c0457eb077a8a8331f9978bda31f5e952b684f1b6e0a52.exe
Filesize425KB
MD51427fd605f082b503f36d243306636a8
SHA15e6687156c4b9aa7202f3db1c17d209d3da8f4c2
SHA2563c0466a746ce451f44ce9eb753ac0da439bf5fd6ff9cd7fcd7a72a84cefe42b8
SHA512241bedc7714f171c86d5733f1e2f2343e565f568d1c0fe90bd9a4351a21cd73d766d294dd97cd67eff0b7c4981ad762e942d4ee4408564d21292016c5973f4eb