Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
68b8e9b0959fe5da8fef1736d86bc316e0f50f0a613bcb43280a34170ba6d596.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68b8e9b0959fe5da8fef1736d86bc316e0f50f0a613bcb43280a34170ba6d596.exe
Resource
win10v2004-20240426-en
General
-
Target
68b8e9b0959fe5da8fef1736d86bc316e0f50f0a613bcb43280a34170ba6d596.exe
-
Size
7.8MB
-
MD5
1b9434c7e2580c42d80874da365a4e08
-
SHA1
0c66b6c725ef7fae97162cc99817e691f90fb7cc
-
SHA256
68b8e9b0959fe5da8fef1736d86bc316e0f50f0a613bcb43280a34170ba6d596
-
SHA512
442bfa12bc9b06eb7520294190268226ffa3029938014e4163ca01c19afa778f5d80bdaf4854bf5e66ab3d1abeacb02d80f4088ca8d3ac8ff4d5bafecc8f55a6
-
SSDEEP
98304:emhd1Urye2WITMDKYjAo6AtprV7wQqZUha5jtSyZIUb:elJIImu6+r2QbaZtli
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 836 31AB.tmp -
Executes dropped EXE 1 IoCs
pid Process 836 31AB.tmp -
Loads dropped DLL 2 IoCs
pid Process 1576 68b8e9b0959fe5da8fef1736d86bc316e0f50f0a613bcb43280a34170ba6d596.exe 1576 68b8e9b0959fe5da8fef1736d86bc316e0f50f0a613bcb43280a34170ba6d596.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1576 wrote to memory of 836 1576 68b8e9b0959fe5da8fef1736d86bc316e0f50f0a613bcb43280a34170ba6d596.exe 28 PID 1576 wrote to memory of 836 1576 68b8e9b0959fe5da8fef1736d86bc316e0f50f0a613bcb43280a34170ba6d596.exe 28 PID 1576 wrote to memory of 836 1576 68b8e9b0959fe5da8fef1736d86bc316e0f50f0a613bcb43280a34170ba6d596.exe 28 PID 1576 wrote to memory of 836 1576 68b8e9b0959fe5da8fef1736d86bc316e0f50f0a613bcb43280a34170ba6d596.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\68b8e9b0959fe5da8fef1736d86bc316e0f50f0a613bcb43280a34170ba6d596.exe"C:\Users\Admin\AppData\Local\Temp\68b8e9b0959fe5da8fef1736d86bc316e0f50f0a613bcb43280a34170ba6d596.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\31AB.tmp"C:\Users\Admin\AppData\Local\Temp\31AB.tmp" --splashC:\Users\Admin\AppData\Local\Temp\68b8e9b0959fe5da8fef1736d86bc316e0f50f0a613bcb43280a34170ba6d596.exe 2DD943C38992F3DAAB1E1328014B14C8F702F98A64743173245D3477F55C29A68DE3096241FE3A24384B0611C99F6643A9D3C82A913EBE41A292162EA4A1C2142⤵
- Deletes itself
- Executes dropped EXE
PID:836
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.8MB
MD58162ee3ff28a5825253c2bbfd4bd33fa
SHA11267b9935c9108bedea6e42fa22bd547842d75b6
SHA25626adef703f04f4e504308c2200599797a1fdbe181ffbd7a7d5775d306cdc3af6
SHA512d771520b904d3cfecaece522b051a7860580925ca3135013cb4c8aeec95fc13aa608bb2e2ac0df2b7514b57d0c9c1f806e0d5aa3c0914aa8e401f1d693ecfb06