Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
Duplicata_29644.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Duplicata_29644.exe
Resource
win10v2004-20240508-en
General
-
Target
Duplicata_29644.exe
-
Size
55KB
-
MD5
d1b0ea1f8a5f5aa158cba47c4a37ea37
-
SHA1
19a0087bd66a24f13005d973128123ac6ade6855
-
SHA256
1dd7179f4e247bec26e88c569c9c3446146752a32ea6aef254b1e236266e96ca
-
SHA512
40e5573548fe2560a6c6b9f5a8807ef3d98bd62e848a97e4c4b6dc5bccb486361ca4222626905f92206481dc786b5a8cd830ae85bc125191d4343f2d5b327280
-
SSDEEP
1536:b1q04Q2yqs6JlaN8drqX8mqSmumJX5kMd2OxyltZx:q7ysJDdun7mumJX5kMsOxyltZx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1228 bling.exe -
Loads dropped DLL 2 IoCs
pid Process 2880 CMD.exe 2880 CMD.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1180 wrote to memory of 2924 1180 Duplicata_29644.exe 28 PID 1180 wrote to memory of 2924 1180 Duplicata_29644.exe 28 PID 1180 wrote to memory of 2924 1180 Duplicata_29644.exe 28 PID 1180 wrote to memory of 2924 1180 Duplicata_29644.exe 28 PID 1180 wrote to memory of 2880 1180 Duplicata_29644.exe 30 PID 1180 wrote to memory of 2880 1180 Duplicata_29644.exe 30 PID 1180 wrote to memory of 2880 1180 Duplicata_29644.exe 30 PID 1180 wrote to memory of 2880 1180 Duplicata_29644.exe 30 PID 2880 wrote to memory of 1228 2880 CMD.exe 32 PID 2880 wrote to memory of 1228 2880 CMD.exe 32 PID 2880 wrote to memory of 1228 2880 CMD.exe 32 PID 2880 wrote to memory of 1228 2880 CMD.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Duplicata_29644.exe"C:\Users\Admin\AppData\Local\Temp\Duplicata_29644.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\CMD.exeCMD /C Copy C:\Users\Admin\AppData\Local\Temp\DUPLIC~1.EXE C:\Users\Admin\AppData\Local\Temp\bling.exe2⤵PID:2924
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C Start C:\Users\Admin\AppData\Local\Temp\bling.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\bling.exeC:\Users\Admin\AppData\Local\Temp\bling.exe3⤵
- Executes dropped EXE
PID:1228
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5d1b0ea1f8a5f5aa158cba47c4a37ea37
SHA119a0087bd66a24f13005d973128123ac6ade6855
SHA2561dd7179f4e247bec26e88c569c9c3446146752a32ea6aef254b1e236266e96ca
SHA51240e5573548fe2560a6c6b9f5a8807ef3d98bd62e848a97e4c4b6dc5bccb486361ca4222626905f92206481dc786b5a8cd830ae85bc125191d4343f2d5b327280