Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 07:23
Static task
static1
Behavioral task
behavioral1
Sample
f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe
Resource
win10v2004-20240709-en
General
-
Target
f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe
-
Size
203KB
-
MD5
0d92a44c4f4cb82315828f649512abf9
-
SHA1
e9df586d0755f74ffd3735fe385051156d746ef5
-
SHA256
f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9
-
SHA512
5ef0797533a3c0986be39c069b986ba7ac0205320fbe440afe73380bbfe29109cc2dcad749b491aec72685f6a883712f061ffca7ff12059e4e3c512a2e7fde82
-
SSDEEP
6144:wv09K6h//mWo+StdZF9A+vULyyUUo5G1B78:w086hHTodd6+MVZo5G1BA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2332 f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe -
Executes dropped EXE 1 IoCs
pid Process 2332 f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe -
Loads dropped DLL 1 IoCs
pid Process 924 f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 924 f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2332 f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 924 wrote to memory of 2332 924 f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe 31 PID 924 wrote to memory of 2332 924 f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe 31 PID 924 wrote to memory of 2332 924 f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe 31 PID 924 wrote to memory of 2332 924 f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe"C:\Users\Admin\AppData\Local\Temp\f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exeC:\Users\Admin\AppData\Local\Temp\f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2332
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\f67ac86b6eccdb665fe0534e77db123b402b97c951ef7e6bb3f5e743b6cd95c9.exe
Filesize203KB
MD519775c7e2c5d158033b618f2efb6e52b
SHA1cb64b641de5db9a3df4848fbdaec9a4df812b108
SHA25665b406dd3b6d9e0cb297e0e36ee2d1c3627d5aa925cfd54bfce7d35e7bc9b9b4
SHA512e44567908fb62231953e647ac1e4004af84ec9d7cd133f95900bf1bc7814725d926e81a7731672255b877db0c64ed8fa4584b0c2f058be6565a56f19cf0eef7d