Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
01bddd8b4c2cde5cec5fa5670a1438d0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
01bddd8b4c2cde5cec5fa5670a1438d0N.exe
Resource
win10v2004-20240704-en
General
-
Target
01bddd8b4c2cde5cec5fa5670a1438d0N.exe
-
Size
500KB
-
MD5
01bddd8b4c2cde5cec5fa5670a1438d0
-
SHA1
2fd8d4257b7a2960df5f7f0f7f1e2ac668a23e06
-
SHA256
4aa2204973400c4966b6fe00023c4e4b4eaf0bc07659945c01fe0f61522fea34
-
SHA512
a49610aac15674d852d9351a9e906f187bdc81e0da1c219b10db18eef80739769add44fb5565019a1211145411d06a94f6e802c9e3b5023c7461fa99e1af0de6
-
SSDEEP
12288:8WBm+95nHfF2mgewFx51OUq7SfJ0WO97Soi41kfgjdkA:8WBz95ndbgfx5C7SfJ0WOBqTgjT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2292 92AE.tmp -
Executes dropped EXE 1 IoCs
pid Process 2292 92AE.tmp -
Loads dropped DLL 1 IoCs
pid Process 1668 01bddd8b4c2cde5cec5fa5670a1438d0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2292 1668 01bddd8b4c2cde5cec5fa5670a1438d0N.exe 30 PID 1668 wrote to memory of 2292 1668 01bddd8b4c2cde5cec5fa5670a1438d0N.exe 30 PID 1668 wrote to memory of 2292 1668 01bddd8b4c2cde5cec5fa5670a1438d0N.exe 30 PID 1668 wrote to memory of 2292 1668 01bddd8b4c2cde5cec5fa5670a1438d0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\01bddd8b4c2cde5cec5fa5670a1438d0N.exe"C:\Users\Admin\AppData\Local\Temp\01bddd8b4c2cde5cec5fa5670a1438d0N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\92AE.tmp"C:\Users\Admin\AppData\Local\Temp\92AE.tmp" --pingC:\Users\Admin\AppData\Local\Temp\01bddd8b4c2cde5cec5fa5670a1438d0N.exe 9C3EB72A44DEB00381A73B09068F9165AA052DC62391FD2475BD6D528F85C58A40B6C831E3A9DEF527494456BBA89CE984A070E989D6089ACC2B938C9CBDFDE92⤵
- Deletes itself
- Executes dropped EXE
PID:2292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500KB
MD553ce0c279092b1845d8081626637939d
SHA199498d2ee2b8af52e5b61bf38dc58c111d3eb4b6
SHA256b3500844f21e910944edeb2ff192174c95b87d9e327799288dc9bb6b09da631d
SHA512f82faaaace0fc909bee0a36f59e6e06886d103fbc589e8b7bcb3f7ebe4c2cb590bd69a0ecd481dba6652815e400474d1bbcfa1b4305a59f2a1be1ea806d0a4f2