Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe
Resource
win10v2004-20240704-en
General
-
Target
f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe
-
Size
29KB
-
MD5
87eac925801bd9819d91eb39133fe001
-
SHA1
748f0b0626667268eb7a0f4bc38ec7a61b2e0ec6
-
SHA256
f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622
-
SHA512
f1d809a24102082d63bc8e61ea533af6310a5ed11be68e2e61a7f4e7a16add47f614180c14c9487b3ae3d417f83d18e003142a330df307169c222d44db188f30
-
SSDEEP
384:dUJ8s1g8ssAi6D9VIt13vfdHldhwLGEGi+OGa0Mr8SmM:SasbLAiict13vfdHldhwyEr+OGa0MrV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1408 ppl32.exe -
Loads dropped DLL 2 IoCs
pid Process 2360 f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe 2360 f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2360 f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe 1408 ppl32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1408 2360 f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe 31 PID 2360 wrote to memory of 1408 2360 f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe 31 PID 2360 wrote to memory of 1408 2360 f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe 31 PID 2360 wrote to memory of 1408 2360 f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe"C:\Users\Admin\AppData\Local\Temp\f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\ppl32.exe"C:\Users\Admin\AppData\Local\Temp\ppl32.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD53cc5c96645290cc6dc3f42917e5de4f6
SHA1c20d681c6438b717380673fc789c7c7d1fb92643
SHA25605c57099c1f1a43131f1909e2c022f2ca61abd154aa5f6de473e729ce411fbeb
SHA512c4def095f29f7c118d5808f14906aab9d6c62f8c2e76de0d13032e6a62b327c372df8579d4496b10cf85b2768ffbc786afec9fb95bb6677ec83473fbccd21011