Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
07/07/2023, 12:23
Behavioral task
behavioral1
Sample
4853d5e2bc6e90exeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
4853d5e2bc6e90exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
4853d5e2bc6e90exeexeexeex.exe
-
Size
75KB
-
MD5
4853d5e2bc6e905277fed1b282dc7829
-
SHA1
da6b31ebdea5969db54fdc81318ab8fade1c513e
-
SHA256
bc11ed1eee97486bfcb63cdbeda0ae72110f1a6a130c62f73ea99b7fc17150f8
-
SHA512
70a79e51801331ab31fec35759cdc7649e53d22aa41d00cf3be631d86f36cf7d407c8bac53e5f1b77e5a7c06acef4beda3956fd6d09077b99dbe1834590fff07
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSh:1nK6a+qdOOtEvwDpjD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2272 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3040 4853d5e2bc6e90exeexeexeex.exe -
resource yara_rule behavioral1/files/0x000a0000000139e9-63.dat upx behavioral1/files/0x000a0000000139e9-66.dat upx behavioral1/memory/3040-67-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x000a0000000139e9-75.dat upx behavioral1/memory/2272-76-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2272 3040 4853d5e2bc6e90exeexeexeex.exe 28 PID 3040 wrote to memory of 2272 3040 4853d5e2bc6e90exeexeexeex.exe 28 PID 3040 wrote to memory of 2272 3040 4853d5e2bc6e90exeexeexeex.exe 28 PID 3040 wrote to memory of 2272 3040 4853d5e2bc6e90exeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4853d5e2bc6e90exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\4853d5e2bc6e90exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5be18888b86a040cb2f62ada4a012674a
SHA18a150a9d0b15bd2a623eab0eaf85b53f709af141
SHA2568a03aea35c3f5886eda902ba962a372e3a1193a5ee1f0417434139a05f6b066b
SHA5125309a2c8591d455564d3e78e6ca3ab30e0373d94f6029b59421981c13e568438ae18828ec36ad2a55da1b9ccd08d5497275606a537624361080e349e2d21c519
-
Filesize
75KB
MD5be18888b86a040cb2f62ada4a012674a
SHA18a150a9d0b15bd2a623eab0eaf85b53f709af141
SHA2568a03aea35c3f5886eda902ba962a372e3a1193a5ee1f0417434139a05f6b066b
SHA5125309a2c8591d455564d3e78e6ca3ab30e0373d94f6029b59421981c13e568438ae18828ec36ad2a55da1b9ccd08d5497275606a537624361080e349e2d21c519
-
Filesize
75KB
MD5be18888b86a040cb2f62ada4a012674a
SHA18a150a9d0b15bd2a623eab0eaf85b53f709af141
SHA2568a03aea35c3f5886eda902ba962a372e3a1193a5ee1f0417434139a05f6b066b
SHA5125309a2c8591d455564d3e78e6ca3ab30e0373d94f6029b59421981c13e568438ae18828ec36ad2a55da1b9ccd08d5497275606a537624361080e349e2d21c519