Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/11/2024, 12:26
Behavioral task
behavioral1
Sample
e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe
Resource
win10v2004-20241007-en
General
-
Target
e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe
-
Size
7.8MB
-
MD5
eaf60985c9d82577ca7e618d2b7ae9cf
-
SHA1
bf3d1095af8e4cb98ddbf89ae00209a6b055656c
-
SHA256
e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32
-
SHA512
d30125983df95695efc55770e045059e1db690dc8b4a8e3e397cdbf603c70966f16e28c36ad16e5745d642b2ee68f54fe1ff27f9d224d601ac33de5c83a8146a
-
SSDEEP
196608:rrEMRrLxWA1HeT39IigDvKub75bcjWgbICT1zfDkAhkCsa9F:Mmd1+TtIisvB5IjWqhzG0
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2764 e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe 2764 e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe 2764 e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe 2764 e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe 2764 e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe 2764 e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe 2764 e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2764 3044 e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe 30 PID 3044 wrote to memory of 2764 3044 e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe 30 PID 3044 wrote to memory of 2764 3044 e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe"C:\Users\Admin\AppData\Local\Temp\e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe"C:\Users\Admin\AppData\Local\Temp\e228046a67266978e2c064cac310ba4e2e824de1a476759645ba4e67e86aeb32.exe"2⤵
- Loads dropped DLL
PID:2764
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5a855f5ffc6690c1bd1706d1dae6251a2
SHA1075f84148285a2b61808d3094c8e1fe35466d59f
SHA25698b4b6a29374e68a383bd6e4b58cd76223335d38d2586c5a494466444811b75c
SHA51235ee703d27e15e192a847f86c22ad613880e1e53296a1bc0ae2249b2a777a0bfe3695fd609278281e8b3e5621534a242c3d3a7bda48c7ab23e513b59ceeb889d
-
Filesize
21KB
MD518a078bf6941f50fc3158b749441b9ce
SHA1279e944990b2fb184a6d09e3e62f574751e2e9a7
SHA256637e9a34044c366b9b004e62ee15aa4875e344a5a6b7634c803a40d95883d7cc
SHA512bc45590aaa25264e2c9640f5a9a357d6b0cf88e9027fcf70fcad666a50cc309378ce9a49e0d02cdf299b2631b724e863e31061090d6ae7893db048afa6fb6943
-
Filesize
21KB
MD58a52d5f941f257c581e856811586b887
SHA1a510353c67126ec00d13a3f4c0b2e494394a2949
SHA2566ce59c2de64b6195695e8754636cbe283a7af3ddb78acf32c3879d7d09aba4b1
SHA51239bad27e61d9a694740556c8290739780ebd7cfdd1f909b85a37ef5c55bc3bd8f439cb6e26d77715649bb04ae701a02fc789535f0d23a5db9ca4a981a38fcb8e
-
Filesize
21KB
MD5cb6102cdcd530e82f9a7f2579dd5be22
SHA18f1881ba356c8d7497580fc5efe2681200632cae
SHA256f5c82a141bdc7929bb3d6d4196c0e8501f4a894fd65a435f8134c073134461ac
SHA512bc9129d58c05991f4567d2ce64e5d5a5ecaa876503ee0644ac61b67fea4b794251cd0f1d1631ef63e8f530a0db074684cde9f35d852ddcb50a9b02d641a63d59
-
Filesize
21KB
MD57f0a0a190aea88884088bd09d36a2c4b
SHA1f8d3039deda1f7fc025f4e4cbbc3010cba3762b3
SHA256a202f21169cc103c019019d3cbc05c3549a8dbac6eed0ecb4e5281e36f028a26
SHA5125f75ad8016ee9649cd565e27930f951cfc7b40b468ca7a5792578301ff2a16825ca2a98103ba8f4e6d8feb761655be1d8c24fa9e1d539bec6c3a5b3a04f8e9b6
-
Filesize
6.7MB
MD5550288a078dffc3430c08da888e70810
SHA101b1d31f37fb3fd81d893cc5e4a258e976f5884f
SHA256789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d
SHA5127244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723
-
Filesize
1.1MB
MD505f2140c1a8a139f2e9866aa2c3166f1
SHA19170cff11f3b91f552ac09a186a3bae7ea7cda25
SHA256048d4c5a51e45777ba15facdaddbf7702594a2268e8de1768ab0f5f4e4d7e733
SHA512bdc7daf31fa9261967cab58c928fe5146b53c96f9b7c702ae8ee761b2652702d9f34dabf4252b7b580311d6dd4d2914ea7721296bebcea3344006eaa0f99f2ed