Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
c2c02cc7dcb43c89b463ec0b2f374130N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c2c02cc7dcb43c89b463ec0b2f374130N.exe
Resource
win10v2004-20240709-en
General
-
Target
c2c02cc7dcb43c89b463ec0b2f374130N.exe
-
Size
84KB
-
MD5
c2c02cc7dcb43c89b463ec0b2f374130
-
SHA1
a463373b3d4b2cbb6812bb8a988f43fe1804c894
-
SHA256
188ed30e6ff2a8f9cc38f304ec14e14fb360aeefbe64bd6ace382c31c899a533
-
SHA512
1d5393d7b9c8f04ecfb87089395c4e0bfc26ba6d28a72dfcc216ed60e20cbe279bb77c506417dff0d79c8844fc6557464f8648659728a2cb07fa960ff81127bb
-
SSDEEP
1536:4j0h/qcO2BXCYwrWgH6jRwyw8xog/BK6ENcFho8Casx1IReCuNsPF+Pk0/WgENgF:LpqkXCFH6twywj9/8fsqRebNCQc0/Wg9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2168 c2c02cc7dcb43c89b463ec0b2f374130N.exe -
Executes dropped EXE 1 IoCs
pid Process 2168 c2c02cc7dcb43c89b463ec0b2f374130N.exe -
Loads dropped DLL 1 IoCs
pid Process 2724 c2c02cc7dcb43c89b463ec0b2f374130N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2724 c2c02cc7dcb43c89b463ec0b2f374130N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2724 c2c02cc7dcb43c89b463ec0b2f374130N.exe 2168 c2c02cc7dcb43c89b463ec0b2f374130N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2168 2724 c2c02cc7dcb43c89b463ec0b2f374130N.exe 31 PID 2724 wrote to memory of 2168 2724 c2c02cc7dcb43c89b463ec0b2f374130N.exe 31 PID 2724 wrote to memory of 2168 2724 c2c02cc7dcb43c89b463ec0b2f374130N.exe 31 PID 2724 wrote to memory of 2168 2724 c2c02cc7dcb43c89b463ec0b2f374130N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2c02cc7dcb43c89b463ec0b2f374130N.exe"C:\Users\Admin\AppData\Local\Temp\c2c02cc7dcb43c89b463ec0b2f374130N.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\c2c02cc7dcb43c89b463ec0b2f374130N.exeC:\Users\Admin\AppData\Local\Temp\c2c02cc7dcb43c89b463ec0b2f374130N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2168
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD56318c3851c3a4fcc689ae762a6f5c069
SHA1c74713852d21378220f9a9133be36d5c09d22812
SHA256dc4ee0f8084dc84e6c7dc735a94381d293c38495ff08c7010f273fe318e635f4
SHA51288ce9b0ca18f598c5affdb369a6e2d8bd4bef37cf3a5ea2eea446ef3de64bd3411c806f881812d5ded7b4432c2cda7106625ef7db624c957131ea17e922ffd79