Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/12/2024, 20:19
Behavioral task
behavioral1
Sample
PySilonHorror.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PySilonHorror.exe
Resource
win10v2004-20241007-en
General
-
Target
PySilonHorror.exe
-
Size
30.3MB
-
MD5
81bf3f0080903382a2fd969f4662a50e
-
SHA1
06bb62eb6598e108027faa17669ca39287ad3c7b
-
SHA256
ed83b9b439a7dc9a79dac0ea5f7f8f33727bcd1824cf6e2b3e96185a441151ba
-
SHA512
0676ef1e3cc54edb17332031abe1698a682c288e08b5893c71fb67265df748d33b9bc480df842fb0536ffa69afdc6f16ea4132665b91416fb033ca4453f15384
-
SSDEEP
786432:omMlhONW8N8m1NxOpl8dPXfrRQ7668BLEqU+CxeD6mp3a:odlhsW08mxElmPvw8BoV46W
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2756 PySilonHorror.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2756 2084 PySilonHorror.exe 30 PID 2084 wrote to memory of 2756 2084 PySilonHorror.exe 30 PID 2084 wrote to memory of 2756 2084 PySilonHorror.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\PySilonHorror.exe"C:\Users\Admin\AppData\Local\Temp\PySilonHorror.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\PySilonHorror.exe"C:\Users\Admin\AppData\Local\Temp\PySilonHorror.exe"2⤵
- Loads dropped DLL
PID:2756
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD53aad23292404a7038eb07ce5a6348256
SHA135cac5479699b28549ebe36c1d064bfb703f0857
SHA25678b1dd211c0e66a0603df48da2c9b67a915ab3258701b9285d3faa255ed8dc25
SHA512f5b6ef04e744d2c98c1ef9402d7a8ce5cda3b008837cf2c37a8b6d0cd1b188ca46585a40b2db7acf019f67e6ced59eff5bc86e1aaf48d3c3b62fecf37f3aec6b