Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
635836657d154047af5987af1d34f669dd21e82fdf3ac8782265a5b890a1b473.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
635836657d154047af5987af1d34f669dd21e82fdf3ac8782265a5b890a1b473.exe
Resource
win10v2004-20240508-en
General
-
Target
635836657d154047af5987af1d34f669dd21e82fdf3ac8782265a5b890a1b473.exe
-
Size
4.2MB
-
MD5
815bb8afa4b88353ff0a52df638379cd
-
SHA1
c284d52a2291dae82f99aaaf8facf3a7ed69e950
-
SHA256
635836657d154047af5987af1d34f669dd21e82fdf3ac8782265a5b890a1b473
-
SHA512
88b0c24c08282b81ec9c05bcd7ea39ac420d0b5b4518dfa9bd25791acefa95505e2c04d1ccfdd6bd72adf40942bd0a067a2c6edaf016ad66cf1531204fe1b1ac
-
SSDEEP
98304:Cmhd1UryezeKpRwTZ2BtV5lVLUjH5oxFbxhVLUjH5oxFbx:ClKK04ZfVUjZEdhVUjZEd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2972 1A35.tmp -
Executes dropped EXE 1 IoCs
pid Process 2972 1A35.tmp -
Loads dropped DLL 2 IoCs
pid Process 2968 635836657d154047af5987af1d34f669dd21e82fdf3ac8782265a5b890a1b473.exe 2968 635836657d154047af5987af1d34f669dd21e82fdf3ac8782265a5b890a1b473.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2972 2968 635836657d154047af5987af1d34f669dd21e82fdf3ac8782265a5b890a1b473.exe 28 PID 2968 wrote to memory of 2972 2968 635836657d154047af5987af1d34f669dd21e82fdf3ac8782265a5b890a1b473.exe 28 PID 2968 wrote to memory of 2972 2968 635836657d154047af5987af1d34f669dd21e82fdf3ac8782265a5b890a1b473.exe 28 PID 2968 wrote to memory of 2972 2968 635836657d154047af5987af1d34f669dd21e82fdf3ac8782265a5b890a1b473.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\635836657d154047af5987af1d34f669dd21e82fdf3ac8782265a5b890a1b473.exe"C:\Users\Admin\AppData\Local\Temp\635836657d154047af5987af1d34f669dd21e82fdf3ac8782265a5b890a1b473.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\1A35.tmp"C:\Users\Admin\AppData\Local\Temp\1A35.tmp" --splashC:\Users\Admin\AppData\Local\Temp\635836657d154047af5987af1d34f669dd21e82fdf3ac8782265a5b890a1b473.exe 6F2DA20B03CD9979B0969F03E7478B6A33B8BF0C7EE377F203A15EABC01E573CB5786B13A565985BE580960C37463054D8C1D7B43FC339AAFE9FB0682C4F799F2⤵
- Deletes itself
- Executes dropped EXE
PID:2972
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD512c06efdd1f886df7bb8cbbe199c1021
SHA1599a97f5404982fea1b944e2024b6545128d414c
SHA256e67718f6242e3cabe4c92f3783b241c1a76fe8c4ca5e93433385a73653577917
SHA512204da8bbae936414597921b14c5ee67f19371571c8914902ca0cbe77c59a4a9fca7ad2d397c41e42617bde3be85a491cc8b64484b92bb79558df4777f9de584a