Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10/10/2022, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
3550/3962.cmd
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3550/3962.cmd
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
3550/candlestick.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
3550/candlestick.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
New_documents.lnk
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
New_documents.lnk
Resource
win10v2004-20220901-en
General
-
Target
3550/3962.cmd
-
Size
258B
-
MD5
de6c5be712cefeeae2fdb6e59c42d245
-
SHA1
6ce3877ce3afb219eba436abe92e09146ec21aa6
-
SHA256
ba1559f92485683a59224f7be9d6a1d6b89535037d9df2c93420f01263128a0e
-
SHA512
a36d94240562429924ab7f598caa56feb9c837bf702de84099dd6740cd55bc4c93260c613b9261c15ad4ae40647595a6190316dced7f7422f1179bee73a2b299
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 808 in.exe 1276 Process not Found -
Loads dropped DLL 1 IoCs
pid Process 1092 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1776 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1092 wrote to memory of 1776 1092 cmd.exe 28 PID 1092 wrote to memory of 1776 1092 cmd.exe 28 PID 1092 wrote to memory of 1776 1092 cmd.exe 28 PID 1092 wrote to memory of 808 1092 cmd.exe 29 PID 1092 wrote to memory of 808 1092 cmd.exe 29 PID 1092 wrote to memory of 808 1092 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3550\3962.cmd"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\system32\PING.EXEping google.com2⤵
- Runs ping.exe
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\in.exeC:\Users\Admin\AppData\Local\Temp\\in.exe 3550\candlestick.dat2⤵
- Executes dropped EXE
PID:808
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD559bce9f07985f8a4204f4d6554cff708
SHA1645c424974fbe5fe7a04cac73f1c23c96e1570b8
SHA256ca24aef558647274d019dfb4d7fd1506d84ec278795c30ba53b81bb36130dc57
SHA5123cf5825a9c7fb80ea0bd36775a92d07f34cd3709ed2c7c8f500f1c8baa5242768f6d575bd2477b77e3f177e7a4994d5c5bddb24c6eb43b60a6bd83ea026a8198
-
Filesize
19KB
MD559bce9f07985f8a4204f4d6554cff708
SHA1645c424974fbe5fe7a04cac73f1c23c96e1570b8
SHA256ca24aef558647274d019dfb4d7fd1506d84ec278795c30ba53b81bb36130dc57
SHA5123cf5825a9c7fb80ea0bd36775a92d07f34cd3709ed2c7c8f500f1c8baa5242768f6d575bd2477b77e3f177e7a4994d5c5bddb24c6eb43b60a6bd83ea026a8198
-
Filesize
19KB
MD559bce9f07985f8a4204f4d6554cff708
SHA1645c424974fbe5fe7a04cac73f1c23c96e1570b8
SHA256ca24aef558647274d019dfb4d7fd1506d84ec278795c30ba53b81bb36130dc57
SHA5123cf5825a9c7fb80ea0bd36775a92d07f34cd3709ed2c7c8f500f1c8baa5242768f6d575bd2477b77e3f177e7a4994d5c5bddb24c6eb43b60a6bd83ea026a8198