Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
191s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe
Resource
win10v2004-20220812-en
General
-
Target
5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe
-
Size
205KB
-
MD5
7eae85f918986f89516fb96fee6f0f4c
-
SHA1
4e73325a601e4851a7900b3817fc2146cd347d55
-
SHA256
5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723
-
SHA512
329cd03682b7b528a2d0a83c8f673c06799c1a2fe9ba2f24aebc34a3200b1a26cbef1166245b07849237af328b8aa5e6d687f12569fa13ef901d4c3eb959b4b4
-
SSDEEP
6144:acPuit+GPqkHT2dt9dkk5UblW56qBid/T:/WigGPqVKIE8id7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 carss.exe -
Loads dropped DLL 2 IoCs
pid Process 1224 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 2036 carss.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\wi7166155nd.temp 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe File created C:\Program Files\Internet Explorer\carss.exe 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe File opened for modification C:\Program Files\Internet Explorer\carss.exe 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1224 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 1224 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 1224 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 1224 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe 2036 carss.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2036 1224 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 28 PID 1224 wrote to memory of 2036 1224 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 28 PID 1224 wrote to memory of 2036 1224 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 28 PID 1224 wrote to memory of 2036 1224 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe"C:\Users\Admin\AppData\Local\Temp\5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files\Internet Explorer\carss.exe"C:\Program Files\Internet Explorer\carss.exe" C:\WINDOWS\Temp\hx107.tmp CodeMain2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
20.2MB
MD5ba6a2eb5f8b5e7593727cb52d9da5ec2
SHA1dba4f7b05253c9b8183239ab7342b83d98149b4f
SHA256b4fa3e8ea6cf01b8fa571cedd19845cc9c3abedb532b51c1286a139d2f080d3e
SHA51277a26ace2a2041e3665f07b89b6aaca10041633fdbb32c79ff8d9fc68cfe6fd5bea71cbe470ca2aaec79f1fecea76872c9e13af11b0afb9b28f918196696d3b7
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
20.2MB
MD5ba6a2eb5f8b5e7593727cb52d9da5ec2
SHA1dba4f7b05253c9b8183239ab7342b83d98149b4f
SHA256b4fa3e8ea6cf01b8fa571cedd19845cc9c3abedb532b51c1286a139d2f080d3e
SHA51277a26ace2a2041e3665f07b89b6aaca10041633fdbb32c79ff8d9fc68cfe6fd5bea71cbe470ca2aaec79f1fecea76872c9e13af11b0afb9b28f918196696d3b7