Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
07/07/2023, 13:01
Behavioral task
behavioral1
Sample
4e3e1704e5ae0eexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
4e3e1704e5ae0eexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
4e3e1704e5ae0eexeexeexeex.exe
-
Size
42KB
-
MD5
4e3e1704e5ae0e27a77ce2de4ffd94ad
-
SHA1
cec6a328073b1d030be6965430de5f8a5059e0dd
-
SHA256
acfdbc2fb1003c4d685d5825391bd3bbc37398430f3eb3c091b9164a03903b84
-
SHA512
aba5479bdefb36b664b1b26e749cea27fbecaf6a006d624206850b6caa8d63db23a0be765d98977036ed3626e210df1b94ee71f58f3869ad0ff36b9df2d91b6d
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzOSIE:qUmnpomddpMOtEvwDpjjaYaFACIE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1388 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3012 4e3e1704e5ae0eexeexeexeex.exe -
resource yara_rule behavioral1/files/0x0009000000012296-63.dat upx behavioral1/files/0x0009000000012296-66.dat upx behavioral1/memory/3012-67-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x0009000000012296-75.dat upx behavioral1/memory/1388-76-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1388 3012 4e3e1704e5ae0eexeexeexeex.exe 29 PID 3012 wrote to memory of 1388 3012 4e3e1704e5ae0eexeexeexeex.exe 29 PID 3012 wrote to memory of 1388 3012 4e3e1704e5ae0eexeexeexeex.exe 29 PID 3012 wrote to memory of 1388 3012 4e3e1704e5ae0eexeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e3e1704e5ae0eexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\4e3e1704e5ae0eexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1388
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD55ec20208568bc267a507aa63e2d481a9
SHA112f6708c36b1db34d98a3ec154d468bc65c35193
SHA2569967e1491e9c4f212deb794df190e2ca3076f7a95e809b488280a2d8a15f1ea8
SHA512b52e60832e8aa5c91096bf7d183c7ca1fc7d4ee1b9ae81747c380b532f9c491483d7c66036a671c263c3e9fd7181389dc9964dc970f6dd1ecdcdef6afe0fd70d
-
Filesize
42KB
MD55ec20208568bc267a507aa63e2d481a9
SHA112f6708c36b1db34d98a3ec154d468bc65c35193
SHA2569967e1491e9c4f212deb794df190e2ca3076f7a95e809b488280a2d8a15f1ea8
SHA512b52e60832e8aa5c91096bf7d183c7ca1fc7d4ee1b9ae81747c380b532f9c491483d7c66036a671c263c3e9fd7181389dc9964dc970f6dd1ecdcdef6afe0fd70d
-
Filesize
42KB
MD55ec20208568bc267a507aa63e2d481a9
SHA112f6708c36b1db34d98a3ec154d468bc65c35193
SHA2569967e1491e9c4f212deb794df190e2ca3076f7a95e809b488280a2d8a15f1ea8
SHA512b52e60832e8aa5c91096bf7d183c7ca1fc7d4ee1b9ae81747c380b532f9c491483d7c66036a671c263c3e9fd7181389dc9964dc970f6dd1ecdcdef6afe0fd70d