Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
30/06/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
9b386de550101f6d1a44d778f36cfde0.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
9b386de550101f6d1a44d778f36cfde0.exe
Resource
win10v2004-20240508-en
General
-
Target
9b386de550101f6d1a44d778f36cfde0.exe
-
Size
3.2MB
-
MD5
9b386de550101f6d1a44d778f36cfde0
-
SHA1
5de9079a865abbbe306582bb158b3d837173c127
-
SHA256
66bb097c6aa3460cf3715e0ebf4d0acd508ea180bcc7bb70d78cd476d54a5799
-
SHA512
ca5cde6d1513142ade33c09351c0b098055efb52429f146bd8b9fefae6409404ab106b2ff7e7d286a7d4f367bb42372a8c9788aa1a4c4dcb003744051786ef7f
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1N2:DBIKRAGRe5K2UZi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1916 f769eee.exe -
Loads dropped DLL 9 IoCs
pid Process 2880 9b386de550101f6d1a44d778f36cfde0.exe 2880 9b386de550101f6d1a44d778f36cfde0.exe 1504 WerFault.exe 1504 WerFault.exe 1504 WerFault.exe 1504 WerFault.exe 1504 WerFault.exe 1504 WerFault.exe 1504 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1504 1916 WerFault.exe 28 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2880 9b386de550101f6d1a44d778f36cfde0.exe 2880 9b386de550101f6d1a44d778f36cfde0.exe 1916 f769eee.exe 1916 f769eee.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2880 wrote to memory of 1916 2880 9b386de550101f6d1a44d778f36cfde0.exe 28 PID 2880 wrote to memory of 1916 2880 9b386de550101f6d1a44d778f36cfde0.exe 28 PID 2880 wrote to memory of 1916 2880 9b386de550101f6d1a44d778f36cfde0.exe 28 PID 2880 wrote to memory of 1916 2880 9b386de550101f6d1a44d778f36cfde0.exe 28 PID 1916 wrote to memory of 1504 1916 f769eee.exe 30 PID 1916 wrote to memory of 1504 1916 f769eee.exe 30 PID 1916 wrote to memory of 1504 1916 f769eee.exe 30 PID 1916 wrote to memory of 1504 1916 f769eee.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b386de550101f6d1a44d778f36cfde0.exe"C:\Users\Admin\AppData\Local\Temp\9b386de550101f6d1a44d778f36cfde0.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f769eee.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f769eee.exe 2594321892⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 6043⤵
- Loads dropped DLL
- Program crash
PID:1504
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD58f600143602fb1c29d4751161171e9cb
SHA1d583a56b37b07b7b5fae80035dbe823269da2327
SHA256b182b110db1f57e5e2017a979bc40e304bbe3336c6af6064e5cacbea50332a7f
SHA51233fd3960ba8ce78b879bd6c5b8472c6604989631696dc57f7a87fa9c653740ac24352186483aaf090b246900436d781e56f56d94018b8b23eae4a1aea3fef2d3