Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
b63d1a558c34e46bb1e5fcfd705769d0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b63d1a558c34e46bb1e5fcfd705769d0N.exe
Resource
win10v2004-20240709-en
General
-
Target
b63d1a558c34e46bb1e5fcfd705769d0N.exe
-
Size
202KB
-
MD5
b63d1a558c34e46bb1e5fcfd705769d0
-
SHA1
72f359d2415418889438d6713249638a7ff48051
-
SHA256
5388419953aa5109f56f12fa71322acced8a81ca623c5c987701ef514204ba00
-
SHA512
f5fefa5529853879c2147a515452a8b359781fe5b1155f7576201427960f5d27042e53c21f43fbc65a70fcfdf3a99867c1ac531c09fe2d3a5e802115f7dc30f6
-
SSDEEP
6144:p6MPejMRxxZY69fesmvOW5Ps9Huhk1sTAitD8FhQwrM46shbc500RXqX+ZyJXSzL:pfTxR9msoOwPWOhXrP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2388 b63d1a558c34e46bb1e5fcfd705769d0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2388 b63d1a558c34e46bb1e5fcfd705769d0N.exe -
Loads dropped DLL 1 IoCs
pid Process 2232 b63d1a558c34e46bb1e5fcfd705769d0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2232 b63d1a558c34e46bb1e5fcfd705769d0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2388 b63d1a558c34e46bb1e5fcfd705769d0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2388 2232 b63d1a558c34e46bb1e5fcfd705769d0N.exe 29 PID 2232 wrote to memory of 2388 2232 b63d1a558c34e46bb1e5fcfd705769d0N.exe 29 PID 2232 wrote to memory of 2388 2232 b63d1a558c34e46bb1e5fcfd705769d0N.exe 29 PID 2232 wrote to memory of 2388 2232 b63d1a558c34e46bb1e5fcfd705769d0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b63d1a558c34e46bb1e5fcfd705769d0N.exe"C:\Users\Admin\AppData\Local\Temp\b63d1a558c34e46bb1e5fcfd705769d0N.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\b63d1a558c34e46bb1e5fcfd705769d0N.exeC:\Users\Admin\AppData\Local\Temp\b63d1a558c34e46bb1e5fcfd705769d0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2388
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD5244a01d0f6c287376a8783a66c4e54f1
SHA13a531186291c5ed0d720ee64fe3b83ff8147e1b6
SHA2561c43d1fec6a83412e625a6a74fdbc474c7b78afecb37605f500026e02d07cc92
SHA512904abd14b3241ebf4cf6ee72391efa590c4239618be33dcfe1553c9b2fb59fb925a139ef757ab9c5e12a0385c4dd1897206fcbd834b1eaa4d8efed048f2241ae