Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe
Resource
win10v2004-20240426-en
General
-
Target
02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe
-
Size
91KB
-
MD5
e21ea08c8546156374b27a1323d2ee07
-
SHA1
70fd54b761167b92b7ef4dd30c1ee403eed2b9a0
-
SHA256
02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a
-
SHA512
db1b98cd67fb724f5c07a061204eed59e625a75d0cd90246ba71c7c21f6629c1e8a54aaa69e3457c65b7e43a2c4d40e4497c64bcfa07039b375d9a95591ef149
-
SSDEEP
1536:St70Jhfnn5sjRK/gAaJHcFOLX1rogiMD+fJnG/FZSt5ox7EQjTaAv5jMBR:K70JhfnnaVJHdygiXRGdZa5ovf1e
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2052 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe -
Executes dropped EXE 1 IoCs
pid Process 2052 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe -
Loads dropped DLL 1 IoCs
pid Process 2184 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2184 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2184 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe 2052 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2052 2184 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe 29 PID 2184 wrote to memory of 2052 2184 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe 29 PID 2184 wrote to memory of 2052 2184 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe 29 PID 2184 wrote to memory of 2052 2184 02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe"C:\Users\Admin\AppData\Local\Temp\02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exeC:\Users\Admin\AppData\Local\Temp\02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2052
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\02389813357778bb644cf564f3757a0001dcd2238bad92b93236fc4cebe1c89a.exe
Filesize91KB
MD5e21cbd420a59f443a4a29a4596f1bde5
SHA1836ac23e058d55774fe89817bccae504da9401bb
SHA256b35b562b3883c070e1d38be77a405bac2f9f761d8a4f0b67e230c7643403eaf5
SHA51272956e517a4cbd480e42ac2a5ea54e797d95df04a3ff1d0a05b1341c4a57a5fcd3c2d6a0da6986c6cf7818a9c6ffcd19010c365a9bff32cc1d0c02da6b65ff4c