Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
131919e8c8d48cexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
131919e8c8d48cexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
131919e8c8d48cexeexeexeex.exe
-
Size
43KB
-
MD5
131919e8c8d48c0af977ce9635dae289
-
SHA1
d0a3da89a650c6fee6af1fd0a1518177406d9465
-
SHA256
fdb776a7e3cca1f34b29821259b12bdfb90cf6c0c3ff2785ddfb75604a26423a
-
SHA512
122a1926e1aa2df6068e0ccc795c7a2149ffdfb376690e9d230f1fcb2f8b53228141124c8576a43a4cbe276e4cbd2c25667f3ed999fc1aabb810e0ea7742203c
-
SSDEEP
384:e/4wODQkzonAYsju5N/surDQtOOtEvwDpjqIGROqS/W/rJ+xLrs7cwcx4Mb:79inqyNR/QtOOtEvwDpjBK/rJ+Nw8b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3032 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1320 131919e8c8d48cexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1320 wrote to memory of 3032 1320 131919e8c8d48cexeexeexeex.exe 28 PID 1320 wrote to memory of 3032 1320 131919e8c8d48cexeexeexeex.exe 28 PID 1320 wrote to memory of 3032 1320 131919e8c8d48cexeexeexeex.exe 28 PID 1320 wrote to memory of 3032 1320 131919e8c8d48cexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\131919e8c8d48cexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\131919e8c8d48cexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3032
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD570039cd55c0823717770a1739794bbf5
SHA19adc17933236d787bd41d52cd30b5202072c0802
SHA256b372f9dcc653b355e7b858baf6150a268b8d62307cd7280d97577fb505571ddd
SHA5123c976678fc308f16b56d249e1e379e77eedfd2cbb97b8e883759d602b281a87473970734fe82c2ceeaf912818616575fedd7cd869a2b737089e392a44496d2ff
-
Filesize
43KB
MD570039cd55c0823717770a1739794bbf5
SHA19adc17933236d787bd41d52cd30b5202072c0802
SHA256b372f9dcc653b355e7b858baf6150a268b8d62307cd7280d97577fb505571ddd
SHA5123c976678fc308f16b56d249e1e379e77eedfd2cbb97b8e883759d602b281a87473970734fe82c2ceeaf912818616575fedd7cd869a2b737089e392a44496d2ff
-
Filesize
43KB
MD570039cd55c0823717770a1739794bbf5
SHA19adc17933236d787bd41d52cd30b5202072c0802
SHA256b372f9dcc653b355e7b858baf6150a268b8d62307cd7280d97577fb505571ddd
SHA5123c976678fc308f16b56d249e1e379e77eedfd2cbb97b8e883759d602b281a87473970734fe82c2ceeaf912818616575fedd7cd869a2b737089e392a44496d2ff