Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
d37bff488dfef0a22d17d0eec6517e60N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d37bff488dfef0a22d17d0eec6517e60N.exe
Resource
win10v2004-20240709-en
General
-
Target
d37bff488dfef0a22d17d0eec6517e60N.exe
-
Size
5.0MB
-
MD5
d37bff488dfef0a22d17d0eec6517e60
-
SHA1
f4eabd5bacfc9fb22266988b5a84a59a045dc6ba
-
SHA256
2a706a9e4d079bc89dcddb7b9ab7c45f70975781728724ff8c555c40076eb9a0
-
SHA512
c9a5b516f6c00cbd55702cd4db04188805e1fc00481cf82fe4e98965f0d3334f95f8076a5027790032501df17e2a7856d2010ba39e434a7cb33395938e30e9b2
-
SSDEEP
49152:p8YDVwFx+CgfniXtXIMfX2wGBDDQ/XSHdX4MPXGgYwUyp:p8YDVw9XtWHdC/yp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 d37bff488dfef0a22d17d0eec6517e60N.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 d37bff488dfef0a22d17d0eec6517e60N.exe -
Loads dropped DLL 4 IoCs
pid Process 2536 d37bff488dfef0a22d17d0eec6517e60N.exe 1248 WerFault.exe 1248 WerFault.exe 1248 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1248 2692 WerFault.exe 31 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2536 d37bff488dfef0a22d17d0eec6517e60N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2692 d37bff488dfef0a22d17d0eec6517e60N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2692 2536 d37bff488dfef0a22d17d0eec6517e60N.exe 31 PID 2536 wrote to memory of 2692 2536 d37bff488dfef0a22d17d0eec6517e60N.exe 31 PID 2536 wrote to memory of 2692 2536 d37bff488dfef0a22d17d0eec6517e60N.exe 31 PID 2536 wrote to memory of 2692 2536 d37bff488dfef0a22d17d0eec6517e60N.exe 31 PID 2692 wrote to memory of 1248 2692 d37bff488dfef0a22d17d0eec6517e60N.exe 32 PID 2692 wrote to memory of 1248 2692 d37bff488dfef0a22d17d0eec6517e60N.exe 32 PID 2692 wrote to memory of 1248 2692 d37bff488dfef0a22d17d0eec6517e60N.exe 32 PID 2692 wrote to memory of 1248 2692 d37bff488dfef0a22d17d0eec6517e60N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d37bff488dfef0a22d17d0eec6517e60N.exe"C:\Users\Admin\AppData\Local\Temp\d37bff488dfef0a22d17d0eec6517e60N.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\d37bff488dfef0a22d17d0eec6517e60N.exeC:\Users\Admin\AppData\Local\Temp\d37bff488dfef0a22d17d0eec6517e60N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:1248
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD542f0c92d854bc97c57685e2fecbea090
SHA19a81217692b1aaa8ab9f2ce36696e8ec842d2893
SHA256671f25836d31be05c2aaa80535304ec1a5f74f479310524fb4fa14143945d469
SHA5126684dff08033c3461ac5d92239d4d8c7275a7f6a8aaff342c907ca02c0b0b0fef544eadab9d02d7a6d9c9d5b7e4136db09aeab241ca68a37a7c7421539117e02