Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

13/03/2023, 17:00

230313-vhycasbc79 7

13/03/2023, 16:55

230313-vfj2wsbc74 7

13/03/2023, 16:51

230313-vcsvmabc57 7

Analysis

  • max time kernel
    29s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2023, 16:55

General

  • Target

    loadez.exe

  • Size

    6.1MB

  • MD5

    8c563d9a30e6917e54634f7ab69d237a

  • SHA1

    c02a4261ec7636051e987716591aa857c66b8e8f

  • SHA256

    4150c0ae6b99bcb70156e355bdfdd198ac37a0fcb80631778cc4b7fffe346db4

  • SHA512

    7103275e3c0ff0433ec52d5d7db25f91c725dc512f2a8b93259e07a30b87c8cdc26e14cab34e2569e4e776165bbe19eab4b117535caf3949d1fd7ffacd81da79

  • SSDEEP

    196608:HdowZEL2Vmd6+Di2c/f/+ScEVRyneyDFh:y1L2Vmd6mJc/eWRghFh

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\loadez.exe
    "C:\Users\Admin\AppData\Local\Temp\loadez.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\loadez.exe
      "C:\Users\Admin\AppData\Local\Temp\loadez.exe"
      2⤵
      • Loads dropped DLL
      PID:1484

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI20002\python310.dll

    Filesize

    4.3MB

    MD5

    c80b5cb43e5fe7948c3562c1fff1254e

    SHA1

    f73cb1fb9445c96ecd56b984a1822e502e71ab9d

    SHA256

    058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

    SHA512

    faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

  • \Users\Admin\AppData\Local\Temp\_MEI20002\python310.dll

    Filesize

    4.3MB

    MD5

    c80b5cb43e5fe7948c3562c1fff1254e

    SHA1

    f73cb1fb9445c96ecd56b984a1822e502e71ab9d

    SHA256

    058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

    SHA512

    faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81