Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 16:34
Static task
static1
Behavioral task
behavioral1
Sample
3e09d2deddf870exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
3e09d2deddf870exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
3e09d2deddf870exeexeexeex.exe
-
Size
146KB
-
MD5
3e09d2deddf8700130e68f08497c203e
-
SHA1
f59edff959010b85d3fd4ca310e98ef2ab0e1a5f
-
SHA256
d156666b72a4a77dc996c41ce588e651e842b5fa810a2a3ce98a7c1fb7214d34
-
SHA512
e18ad9a3bf514f85ee5e0ecdd9b0917c5a91010e24ee739230768fe2a65c9aab028d388152576f39225a8d3a2edc05a623bd96e0da64fd103a9826d4828f7273
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbxGYQbxGYQbPlooNL:V6a+pOtEvwDpjt22X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2948 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2320 3e09d2deddf870exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2948 2320 3e09d2deddf870exeexeexeex.exe 29 PID 2320 wrote to memory of 2948 2320 3e09d2deddf870exeexeexeex.exe 29 PID 2320 wrote to memory of 2948 2320 3e09d2deddf870exeexeexeex.exe 29 PID 2320 wrote to memory of 2948 2320 3e09d2deddf870exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e09d2deddf870exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\3e09d2deddf870exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2948
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD5fa54d61d89aa40d0c24d1c36390c0f27
SHA1fe3777039b4039873a9e0bb38d07cf01e5b64e2a
SHA25649868564f5270d4774e4db7eaa73c232bda745e516944bf3ec4a07854f429c33
SHA5123d62c402142a89c3a0fba1dd6846bbaadd1d0b9b928f79289ba488b0873528299f0b644bfdfd6bbe982eb02753da5013769c008f808ba48fcc07273ee4b37658
-
Filesize
146KB
MD5fa54d61d89aa40d0c24d1c36390c0f27
SHA1fe3777039b4039873a9e0bb38d07cf01e5b64e2a
SHA25649868564f5270d4774e4db7eaa73c232bda745e516944bf3ec4a07854f429c33
SHA5123d62c402142a89c3a0fba1dd6846bbaadd1d0b9b928f79289ba488b0873528299f0b644bfdfd6bbe982eb02753da5013769c008f808ba48fcc07273ee4b37658
-
Filesize
146KB
MD5fa54d61d89aa40d0c24d1c36390c0f27
SHA1fe3777039b4039873a9e0bb38d07cf01e5b64e2a
SHA25649868564f5270d4774e4db7eaa73c232bda745e516944bf3ec4a07854f429c33
SHA5123d62c402142a89c3a0fba1dd6846bbaadd1d0b9b928f79289ba488b0873528299f0b644bfdfd6bbe982eb02753da5013769c008f808ba48fcc07273ee4b37658