Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
cf6c3b1194cb70df36e00d7f690cc50c871192c07b8f699773ddbe8445e52297.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
cf6c3b1194cb70df36e00d7f690cc50c871192c07b8f699773ddbe8445e52297.exe
Resource
win10v2004-20240508-en
General
-
Target
cf6c3b1194cb70df36e00d7f690cc50c871192c07b8f699773ddbe8445e52297.exe
-
Size
7.0MB
-
MD5
7ee2a6efb924d0ce7ee79dcb032f8852
-
SHA1
c060dc00ab10db48b97f912e20352009f7583aad
-
SHA256
cf6c3b1194cb70df36e00d7f690cc50c871192c07b8f699773ddbe8445e52297
-
SHA512
337b68f6e3dd6ac326152f2530e31909c200dd5f5c4f92c2dea81812c0704abed236cbef6b59f3e1fed8b2ba240590e8f6801cde59302a6114716abb54c64d1c
-
SSDEEP
98304:emhd1UryefgTdEpVCdZkXE9qPgV7wQqZUha5jtSyZIUbn:el/1ak0kPg2QbaZtliK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2408 1F44.tmp -
Executes dropped EXE 1 IoCs
pid Process 2408 1F44.tmp -
Loads dropped DLL 2 IoCs
pid Process 1648 cf6c3b1194cb70df36e00d7f690cc50c871192c07b8f699773ddbe8445e52297.exe 1648 cf6c3b1194cb70df36e00d7f690cc50c871192c07b8f699773ddbe8445e52297.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2408 1648 cf6c3b1194cb70df36e00d7f690cc50c871192c07b8f699773ddbe8445e52297.exe 28 PID 1648 wrote to memory of 2408 1648 cf6c3b1194cb70df36e00d7f690cc50c871192c07b8f699773ddbe8445e52297.exe 28 PID 1648 wrote to memory of 2408 1648 cf6c3b1194cb70df36e00d7f690cc50c871192c07b8f699773ddbe8445e52297.exe 28 PID 1648 wrote to memory of 2408 1648 cf6c3b1194cb70df36e00d7f690cc50c871192c07b8f699773ddbe8445e52297.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf6c3b1194cb70df36e00d7f690cc50c871192c07b8f699773ddbe8445e52297.exe"C:\Users\Admin\AppData\Local\Temp\cf6c3b1194cb70df36e00d7f690cc50c871192c07b8f699773ddbe8445e52297.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\1F44.tmp"C:\Users\Admin\AppData\Local\Temp\1F44.tmp" --splashC:\Users\Admin\AppData\Local\Temp\cf6c3b1194cb70df36e00d7f690cc50c871192c07b8f699773ddbe8445e52297.exe 9DEBCAADDB3FD87A415BA8BBD99D76FD1FF4FFE2E648EAE0465AF56585C104D8388536E12DD54C55F370B93CAE641DB4F218C2D35F7D5FB849B5884AAD13856D2⤵
- Deletes itself
- Executes dropped EXE
PID:2408
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD5f42009e480e269a094cbcf61d882a983
SHA1cd62de92205c6c0f1d5dff2ac44d0c3a6e2be9fe
SHA25607017b0350d8c9db5fe7fd68919620783c35d47ce0982c4130d3fda114e5c3ed
SHA51239a240829f610784959e25419ef9bf82d84566cdfa340a0937768ab22b6a1d499bed1570fa569abf4f50212d4b122f335dcc5a10fc86fd591aa40b3df2185877