Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/08/2024, 08:51
Behavioral task
behavioral1
Sample
WallpaperDownloader_en.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
WallpaperDownloader_en.exe
Resource
win10v2004-20240802-en
General
-
Target
WallpaperDownloader_en.exe
-
Size
10.4MB
-
MD5
c0c4f46f0741a92087954edae65087c9
-
SHA1
145f5cbfff6807c982b4d9d4d73d09e6ed0acf0d
-
SHA256
8550a6366d48a9a24c0b6e11f97c08b143d8babb034f1401cbabfd30c5d3fb95
-
SHA512
ca1f6072beef424858fca67c1e2afa523be900c4c3dff07e1f11ae4378ad977fcd353cba79c40f350238140469ec9d1f6af823fff35fc989073f61be0b07b49d
-
SSDEEP
196608:jt0A9VjA1HeT39Iig7auDXURuA3dSYf0W8/LsQVdxbTv4q:q4O1+TtIinuARuA3dSjW8YQVDTv4q
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2140 WallpaperDownloader_en.exe 2140 WallpaperDownloader_en.exe 2140 WallpaperDownloader_en.exe 2140 WallpaperDownloader_en.exe 2140 WallpaperDownloader_en.exe 2140 WallpaperDownloader_en.exe 2140 WallpaperDownloader_en.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2140 2136 WallpaperDownloader_en.exe 31 PID 2136 wrote to memory of 2140 2136 WallpaperDownloader_en.exe 31 PID 2136 wrote to memory of 2140 2136 WallpaperDownloader_en.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\WallpaperDownloader_en.exe"C:\Users\Admin\AppData\Local\Temp\WallpaperDownloader_en.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\WallpaperDownloader_en.exe"C:\Users\Admin\AppData\Local\Temp\WallpaperDownloader_en.exe"2⤵
- Loads dropped DLL
PID:2140
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5f72d7e4b41e5733049887ff73a8f1a87
SHA123b74ed0544acc9612c9a2e453077c5dc16e1acf
SHA2568b6d5c7e459e57dde0149dc7207b4b19673b206f1a942f992393f1674d6a333a
SHA5127a3391affeb78761feef1e0b54d27ccf71754041a7c45a7db0c51ce5ca0f56d5c12a591d841b6ab6e73d12605d22cf925bf372c7a9bc4063e675ab892c24ca91
-
Filesize
21KB
MD551885e0559713be0550a6215913e7b26
SHA123919da8abaccb1742d5138f2305d1a6008b9031
SHA2567822dfd45ed7f6fd6cc91e309272b2113f6a948b37c6f9746d07ac4467bcdc6a
SHA51289abe333c13c57e48e250dcad7cda0e2feac80f692877a21ecffe9768508fc3608c14a027519f51ce274d94e05d07f64518500c48983fc010ce4f4b845c44c65
-
Filesize
21KB
MD5794635599ffb9e974cbb7b5293af6d4d
SHA17aea4013f08ed9ccf8d08efae4c3a262fd0f5847
SHA256d74093ffb8f2b461f15253427ec37c2b3168d8b941b3bb1ffe7972d5d1f63b17
SHA51290b51c4e26ca2315764f56135536e203da1a325ddfe472bdc3ef5ea96bea3ddd6f731b914b7ba800d6d26087a45b6c99c136fcbdf48f6179cc36c6742309aec0
-
Filesize
22KB
MD548a4805a8be5cad0aef4eeb7bd84c7ad
SHA1e724f4fea9b24358e5b385f45304ea7bb80ed143
SHA256c7005118482a491e969d66e562cd2c1e4e77d68852fe7ce0039f9d1232b88841
SHA512f30a2db944e0eb9ae329b36ea5e1ecd16fb87f5a5652e31e4c2fa20bae55b9cad110ad88993f08bdf522a8004020d6aff09802ccfc3209d4a2ca6cbff0022090
-
Filesize
21KB
MD53ced70e57e887c91a803c7b38e3c0fd9
SHA1b73b70f2798539934929d29a1d4bd935fa56c7ae
SHA2569f14946327fbe39a120ef9197ab35f94cfe1ac60ad337e70c03a79197a5cff56
SHA512b0d597b1990c8f9804c847bd65515956feeb1541916180bc306495316b623f614bd05431723f38ac68426e4045f4b21058433c0f0541cd6ae8c1c44404415b19
-
Filesize
5.5MB
MD5387bb2c1e40bde1517f06b46313766be
SHA1601f83ef61c7699652dec17edd5a45d6c20786c4
SHA2560817a2a657a24c0d5fbb60df56960f42fc66b3039d522ec952dab83e2d869364
SHA512521cde6eaa5d4a2e0ef6bbfdea50b00750ae022c1c7bd66b20654c035552b49c9d2fac18ef503bbd136a7a307bdeb97f759d45c25228a0bf0c37739b6e897bad
-
Filesize
1.1MB
MD51ae0b41c80408f962164997529e80abe
SHA11712df1be8ecaeacc8fc2fe9b166268e519dd386
SHA25675fa827aee40f5af5d2599fa025a43d90e833c540ed5512e7b60b1d04b94ae7b
SHA5122c77816190848f907ea3907c2d7d3310bbc670c388156de8259616609fefc239234cc435a478c2e92d97f7cf81dc6b7c6e1437054bbcbc030e725ef03f03680e