Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
03/08/2024, 00:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
rains hwid (1).exe
Resource
win7-20240705-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
rains hwid (1).exe
Resource
win10v2004-20240802-en
3 signatures
150 seconds
General
-
Target
rains hwid (1).exe
-
Size
16.1MB
-
MD5
b70faa6bea34432debd749f3b1b8720e
-
SHA1
3f368053e654892c3f9b3ecdfd6962ce88364e5d
-
SHA256
12eb7fd26d6593a71a30b1b2d16e720788f74a5123b98ad97f9a45cf72ba05ec
-
SHA512
74d3ec1780c6d242957cb1a4874de8a55b01c72cae3eac859171bdae7435ebd2b7015be5030896d490945b6fe8037dc78af287b8de1ded75a7e96023e909e442
-
SSDEEP
393216:pv7QI+Zc7sa/p8fSbvaXjbvv3i/3Ky6wEIR8gUBzgJCjR4P:1ucwa/q6vArS7EIR8Nte
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 700 rains hwid (1).exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 700 wrote to memory of 2172 700 rains hwid (1).exe 30 PID 700 wrote to memory of 2172 700 rains hwid (1).exe 30 PID 700 wrote to memory of 2172 700 rains hwid (1).exe 30 PID 2172 wrote to memory of 2820 2172 cmd.exe 32 PID 2172 wrote to memory of 2820 2172 cmd.exe 32 PID 2172 wrote to memory of 2820 2172 cmd.exe 32 PID 2172 wrote to memory of 2936 2172 cmd.exe 33 PID 2172 wrote to memory of 2936 2172 cmd.exe 33 PID 2172 wrote to memory of 2936 2172 cmd.exe 33 PID 2172 wrote to memory of 2952 2172 cmd.exe 34 PID 2172 wrote to memory of 2952 2172 cmd.exe 34 PID 2172 wrote to memory of 2952 2172 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\rains hwid (1).exe"C:\Users\Admin\AppData\Local\Temp\rains hwid (1).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\rains hwid (1).exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\rains hwid (1).exe" MD53⤵PID:2820
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2936
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2952
-
-