Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 11:18 UTC
Static task
static1
Behavioral task
behavioral1
Sample
a5e39edc04588aec600f0c816b1160a0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a5e39edc04588aec600f0c816b1160a0N.exe
Resource
win10v2004-20240709-en
General
-
Target
a5e39edc04588aec600f0c816b1160a0N.exe
-
Size
73KB
-
MD5
a5e39edc04588aec600f0c816b1160a0
-
SHA1
fb2144e6c341894052b0578cba1d55582379474d
-
SHA256
1d6118acc27204ce91df6539b07f4144d344a061fb3818865607789b7ca1787c
-
SHA512
c8f77e3bc6c2c49c0fcdf58a29424bfa11e98e18d49c3c5d54303f7269eae363d150478b4e24f3af4a71a0c7e6bed8eded29a1cebe008d9978ea3cf131ea2e0a
-
SSDEEP
1536:hbcGAJK5QPqfhVWbdsmA+RjPFLC+e5he0ZGUGf2g:hAXJNPqfcxA+HFsheOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2740 $TMP!10@.COM -
Loads dropped DLL 2 IoCs
pid Process 2780 cmd.exe 2780 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2780 2704 a5e39edc04588aec600f0c816b1160a0N.exe 31 PID 2704 wrote to memory of 2780 2704 a5e39edc04588aec600f0c816b1160a0N.exe 31 PID 2704 wrote to memory of 2780 2704 a5e39edc04588aec600f0c816b1160a0N.exe 31 PID 2704 wrote to memory of 2780 2704 a5e39edc04588aec600f0c816b1160a0N.exe 31 PID 2780 wrote to memory of 2740 2780 cmd.exe 32 PID 2780 wrote to memory of 2740 2780 cmd.exe 32 PID 2780 wrote to memory of 2740 2780 cmd.exe 32 PID 2780 wrote to memory of 2740 2780 cmd.exe 32 PID 2740 wrote to memory of 2068 2740 $TMP!10@.COM 33 PID 2740 wrote to memory of 2068 2740 $TMP!10@.COM 33 PID 2740 wrote to memory of 2068 2740 $TMP!10@.COM 33 PID 2740 wrote to memory of 2068 2740 $TMP!10@.COM 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5e39edc04588aec600f0c816b1160a0N.exe"C:\Users\Admin\AppData\Local\Temp\a5e39edc04588aec600f0c816b1160a0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c $TMP!10@.COM2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\$TMP!10@.COM$TMP!10@.COM3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 15225.exe4⤵PID:2068
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5c1f18ce805145a7277b4422688bc3bcd
SHA1c4beb4a4217f0d25edff4bf1b089f952723ca98a
SHA256257b145caa490e58e65248fd6e4ed0f0f01d196b7277f0edf706a1088627f959
SHA5123469b702b5c7a336b52aa961b736cb4fbcb9f61bc8dadc7eafe89d1379af74fe0ff4dc5124e1cdf7c0f18744f6fe48ed998f917a2995607fdec8e0f6a304fca9