Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe
Resource
win10v2004-20240709-en
General
-
Target
3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe
-
Size
2.5MB
-
MD5
f567e516f4a332bc5357ccf20a7d010e
-
SHA1
ae8eb4b86374d0aaf25ce990a2a786e2b3227409
-
SHA256
3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544
-
SHA512
00ba84c9486cd474ac0ceee64f4ff3c0c1456f41d5b929e7b6ab9a4562c0bb6ca4865571645db34963ee7bc780dd641f67153f28d25a9a9b56ec69eaedecd530
-
SSDEEP
49152:Il6666666666666666666666666666666x666666666666666fwwwwwwwwwwwwwd:q666666666666666666666666666666u
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2864 3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe 2800 3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2800 2864 3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe 30 PID 2864 wrote to memory of 2800 2864 3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe 30 PID 2864 wrote to memory of 2800 2864 3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe 30 PID 2864 wrote to memory of 2800 2864 3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe"C:\Users\Admin\AppData\Local\Temp\3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe"C:\Users\Admin\AppData\Local\Temp\3e73994708e9248361d0db660e708cc5d3f780beafb047a0b59e3e0ef9c98544.exe" --statistics=https://api.browser.yandex.ru/installstats/send/dtype=stred/pid=457/cid=72992/path=extended_stat/vars=-action=service_unused,-brand_id=unknown,-error=UNKNOWN_COMMAND,-installer_type=service,-launched=false,-old_style=1,-old_ver=,-result=0,-stage=error,-ui=38605CEF_1E4C_4DF9_A553_E4DEE4BA7C6C/*2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51ee112dd55d0a1760090045746c442d9
SHA1cb7598197b498ca2037f7c62724a912753100a04
SHA256d6bd00a903abe2a174c23ced7fcedfd4170b0ba8715446cc8f017ac83e2dda36
SHA512790913cbfa49aa0e6f3f4af1622c7fd5f387929250302d4864d420e2b6e206b6603c05de37f7244abfe5836fc056cb60657b058e0d5f78fb72a261861665f020
-
Filesize
3KB
MD563abdd08f24185491e358733a0c1175a
SHA1759a91a39273681858383cc8c415d4495d928d95
SHA2565807e7248d4984e04033dceaf7d50089fce191fea884593b45d482a1612cbfb0
SHA5124352dc6fa4edbe2d079977b85648838a1284f0d29df148ca84eb70def11b7b84d48385324e659b64fcffeed2a695e5e7d073c44fefa4c86a3d4dffc73d3cf49f
-
Filesize
4KB
MD56e91ce81a2422535e1969d606dc2575e
SHA126bd7072ddd15a5825a2d5cb9d01c0c3a93cc762
SHA256c117ad4111374df53cb85775ca64c8d8aaf8425b086836cff02bd23adc6097c0
SHA5121cc4920ce518cee9290eb2d9f7554820ab746b7173dc268fe10f74ae492f8563ca3f62d2d99963366c1d423d8162361d79daaa94594a446d937f57d28fd81533