Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
9s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/03/2025, 18:30
Behavioral task
behavioral1
Sample
Grabber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Grabber.exe
Resource
win10v2004-20250217-en
General
-
Target
Grabber.exe
-
Size
17.1MB
-
MD5
3b309140a92fb2c59e7caecfa8fac9b0
-
SHA1
4bb33ee47de73b6e97a81b89955eca198e3d41be
-
SHA256
b2b8a75939a8dab98ded0bb79406bdfa7a6f4161b6d907fac880c4d75f2b13a2
-
SHA512
675df964502d38ce485bfa210b7b1913aaadedc6c02186ddb306b7fbed881cf8514405874d9753aa04b5d4af5f8615e438e0f8f3f4adcf172307fef3793e6ed3
-
SSDEEP
196608:/7/lOqPns3VjCu1iOjmFp00sKYu/PaQnliuim59IzPqzQKJ8P9qfFC/wzYPOqffN:IqPns359K6Qlli2cPqzt8Fwzd06dAL
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1644 Grabber.exe -
resource yara_rule behavioral1/files/0x000500000001a443-92.dat upx behavioral1/memory/1644-94-0x000007FEF5B20000-0x000007FEF6109000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1644 1692 Grabber.exe 30 PID 1692 wrote to memory of 1644 1692 Grabber.exe 30 PID 1692 wrote to memory of 1644 1692 Grabber.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD52c66bb80a338271ef2a8b7fd3d5e55dd
SHA11ae43206ccc5c897b345ecb574ced926caf24fd1
SHA25665270474a91c2b20ab8f1ed3f8fbc4c19516157b6997be0e084ccfcce9298ced
SHA512df9d6a01660c9390e98f13829d3178d576542ca46b8ead5f00fa6832ca571a745939c75288a552db5a22221c68477cc0e23084e102d6f5b47b36d98b23da988b