Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
07/07/2023, 20:19 UTC
Static task
static1
Behavioral task
behavioral1
Sample
5753d347237d9dexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
5753d347237d9dexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
5753d347237d9dexeexeexeex.exe
-
Size
35KB
-
MD5
5753d347237d9dbfd76b7d7d13e8988e
-
SHA1
1c860173d3b099123f80800c526c14319ade6255
-
SHA256
e86206e99ca57ae6c8b0d88b574b46bba6122d7fb8849a0cd274422ea87c9167
-
SHA512
3621a8c8a97044b9391fd853ab593be503f5caa8634c784372eb0f7a2c2c39a4379694e3e2818027472ad90ffc848a865079c6303503c6ea4f57629bab681d4f
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf6XT+72DxL9Dk:bgX4zYcgTEu6QOaryfjqDlC76L9A
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2056 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2408 5753d347237d9dexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2056 2408 5753d347237d9dexeexeexeex.exe 28 PID 2408 wrote to memory of 2056 2408 5753d347237d9dexeexeexeex.exe 28 PID 2408 wrote to memory of 2056 2408 5753d347237d9dexeexeexeex.exe 28 PID 2408 wrote to memory of 2056 2408 5753d347237d9dexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5753d347237d9dexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\5753d347237d9dexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2056
-
Network
-
Remote address:8.8.8.8:53Requestmytarta.comIN AResponsemytarta.comIN A160.121.32.33
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
46 B 1
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
152 B 120 B 3 3
-
104 B 40 B 2 1
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD55a8096e2cfea698dda3f645b74685dde
SHA1758532075c9058af1fd2b1ae08d73734e3e55beb
SHA2568590ccfcb00a0725bc0e34fdd62f85f950c2caec29d95fb61f0200d540c2dbe1
SHA512eb0f28da3810232ed93cfc5be5619e6ae9991acd4e1f519ada498f498411e5068019b85b6f9f44c08940bf4ac29d3d1b1c6394b42c34a4cf3c18cd32ac81835b
-
Filesize
35KB
MD55a8096e2cfea698dda3f645b74685dde
SHA1758532075c9058af1fd2b1ae08d73734e3e55beb
SHA2568590ccfcb00a0725bc0e34fdd62f85f950c2caec29d95fb61f0200d540c2dbe1
SHA512eb0f28da3810232ed93cfc5be5619e6ae9991acd4e1f519ada498f498411e5068019b85b6f9f44c08940bf4ac29d3d1b1c6394b42c34a4cf3c18cd32ac81835b
-
Filesize
35KB
MD55a8096e2cfea698dda3f645b74685dde
SHA1758532075c9058af1fd2b1ae08d73734e3e55beb
SHA2568590ccfcb00a0725bc0e34fdd62f85f950c2caec29d95fb61f0200d540c2dbe1
SHA512eb0f28da3810232ed93cfc5be5619e6ae9991acd4e1f519ada498f498411e5068019b85b6f9f44c08940bf4ac29d3d1b1c6394b42c34a4cf3c18cd32ac81835b