Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe
Resource
win10v2004-20240508-en
General
-
Target
03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe
-
Size
4.8MB
-
MD5
866ddec917d4206ad0e2077b0c420681
-
SHA1
bbc26fad62ddd5a6b574eae8dac4064f7cf58746
-
SHA256
03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4
-
SHA512
7f79c62e54da1f292eb1f8bc641ba7fc3437d260ba06802055890ff76f84735d24fec39af3422276f9bf48f0aaa7ae34142f6fc6c9aaec9265675e37c5989d65
-
SSDEEP
98304:emhd1UryeyG/hQNgenKV7wQqZUha5jtSyR:elSG/S62QbaZtlR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2944 228E.tmp -
Executes dropped EXE 1 IoCs
pid Process 2944 228E.tmp -
Loads dropped DLL 2 IoCs
pid Process 1196 03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe 1196 03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2944 1196 03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe 28 PID 1196 wrote to memory of 2944 1196 03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe 28 PID 1196 wrote to memory of 2944 1196 03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe 28 PID 1196 wrote to memory of 2944 1196 03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe"C:\Users\Admin\AppData\Local\Temp\03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\228E.tmp"C:\Users\Admin\AppData\Local\Temp\228E.tmp" --splashC:\Users\Admin\AppData\Local\Temp\03cd63bc163f0a73f8315114c8563899e2b64444db3cc80aa829c862377ca9e4.exe 76A7F63873E0DB085574A3292E61C901F9088A5940F4211EE49B614B180230FC2F0897A98E72436C5355DE1A8473A1EB6721A75AF1755267810E9DD1338A58012⤵
- Deletes itself
- Executes dropped EXE
PID:2944
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD5063c551fff92eaef8b08edbc1a7112b7
SHA17416ed9f0dd261db4ca231aae075bcb4e25d5c42
SHA256aa836d76106b94bac74a99e542c416956785bbd18996f860d03cf15b0976db48
SHA512ae2d6325e7a1eaff2dc6c748f9b896df4a67983c0f72c2de85e55c5c4aee89270d41897dcdcbf1e9ee229a4a4830c303e7f51ca04c2b0ba240617e08abedbb2a