Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
07/06/2024, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
f793707851093e856c0d32bed082e52f23223f62fcfca4b6550eb6e045471eb3.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f793707851093e856c0d32bed082e52f23223f62fcfca4b6550eb6e045471eb3.exe
Resource
win10v2004-20240226-en
General
-
Target
f793707851093e856c0d32bed082e52f23223f62fcfca4b6550eb6e045471eb3.exe
-
Size
5.4MB
-
MD5
10244f7d8e89b9116b41741b63bdfa36
-
SHA1
e81bedde03dd7ad61f8add5ac568cbf1a0c6ad16
-
SHA256
f793707851093e856c0d32bed082e52f23223f62fcfca4b6550eb6e045471eb3
-
SHA512
121c3d1edc8f124d639e4007505d116226a2bee00c757fe910fe596c4557c99f577deaa1d492a5818c4e0ac0156a8e90fe4cc886c8727bdedfa4ab4a402d6e2c
-
SSDEEP
98304:emhd1Uryei0AGu312qoZBGV7wQqZUha5jtSyZIUh:elEr31BoZBG2QbaZtliU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2848 273F.tmp -
Executes dropped EXE 1 IoCs
pid Process 2848 273F.tmp -
Loads dropped DLL 2 IoCs
pid Process 2976 f793707851093e856c0d32bed082e52f23223f62fcfca4b6550eb6e045471eb3.exe 2976 f793707851093e856c0d32bed082e52f23223f62fcfca4b6550eb6e045471eb3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2848 2976 f793707851093e856c0d32bed082e52f23223f62fcfca4b6550eb6e045471eb3.exe 28 PID 2976 wrote to memory of 2848 2976 f793707851093e856c0d32bed082e52f23223f62fcfca4b6550eb6e045471eb3.exe 28 PID 2976 wrote to memory of 2848 2976 f793707851093e856c0d32bed082e52f23223f62fcfca4b6550eb6e045471eb3.exe 28 PID 2976 wrote to memory of 2848 2976 f793707851093e856c0d32bed082e52f23223f62fcfca4b6550eb6e045471eb3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f793707851093e856c0d32bed082e52f23223f62fcfca4b6550eb6e045471eb3.exe"C:\Users\Admin\AppData\Local\Temp\f793707851093e856c0d32bed082e52f23223f62fcfca4b6550eb6e045471eb3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\273F.tmp"C:\Users\Admin\AppData\Local\Temp\273F.tmp" --splashC:\Users\Admin\AppData\Local\Temp\f793707851093e856c0d32bed082e52f23223f62fcfca4b6550eb6e045471eb3.exe 14450EF4D68DEEDF4FCB10E38B08BAEAA4B561B849FBA71C57D6DDB29BEE27B97162B542096E68AEF87C29DE2D3B3457AAC3F14EBB5E210B25F3D9CCBEA938302⤵
- Deletes itself
- Executes dropped EXE
PID:2848
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD5ecf7d59f602a3c216ad9f3aaecd3f4ab
SHA1aa2561083a3c75ab9305d3e0c34e6779fe9e610e
SHA256ecf3b5d79cf011cde0518235102283dabf28a3e1a0c805394bf5ee250dc88488
SHA51221063900b14b86b9f4107785ca121d3c5fb50079d3a095fc08cd1f8cb36bb928ff47018ebc6e0ffbd9beca0177497c8a929429d82cca4b5a5eda9ebf51c8ce6a