Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 09:32
Behavioral task
behavioral1
Sample
67421a0c0f8486exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
67421a0c0f8486exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
67421a0c0f8486exeexeexeex.exe
-
Size
110KB
-
MD5
67421a0c0f84863fdc4c5620f9a5ab79
-
SHA1
e8d9959802011c4326bb4c652020601d6bb3508d
-
SHA256
8d3f7875dcbf7a5b7ce745c5a510dc3f376858f2eca89189f8304a95d9319d2c
-
SHA512
028e5088a4cf9e8ca17716efe352ef7fe47900abb5a4f23d294cdad3710aaee9141883cf861f852360b8dbe2fedd241afcf7878931ebaafd5c99ef69860151e4
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNeRVp3:T6a+rdOOtEvwDpjLzIp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2272 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2292 67421a0c0f8486exeexeexeex.exe -
resource yara_rule behavioral1/files/0x000900000001225d-63.dat upx behavioral1/files/0x000900000001225d-66.dat upx behavioral1/memory/2292-67-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000900000001225d-75.dat upx behavioral1/memory/2272-76-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2272 2292 67421a0c0f8486exeexeexeex.exe 29 PID 2292 wrote to memory of 2272 2292 67421a0c0f8486exeexeexeex.exe 29 PID 2292 wrote to memory of 2272 2292 67421a0c0f8486exeexeexeex.exe 29 PID 2292 wrote to memory of 2272 2292 67421a0c0f8486exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\67421a0c0f8486exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\67421a0c0f8486exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110KB
MD5419799fc7f6ad2de9a5b969615d79205
SHA15a64b23c92b4ca569a2a6397b957ccc43f8d8b57
SHA256d87cac12f08bfc4953373198cf22316561087d0cff2c22df3616663bd06bf1e0
SHA512742c506fba77a3875cbf3d22a836db17191fb41849dd0e3e1437f1a4545270a7a963d60e87f123b932b5f97013817275fb51fd38d84039687b087de2f4626c64
-
Filesize
110KB
MD5419799fc7f6ad2de9a5b969615d79205
SHA15a64b23c92b4ca569a2a6397b957ccc43f8d8b57
SHA256d87cac12f08bfc4953373198cf22316561087d0cff2c22df3616663bd06bf1e0
SHA512742c506fba77a3875cbf3d22a836db17191fb41849dd0e3e1437f1a4545270a7a963d60e87f123b932b5f97013817275fb51fd38d84039687b087de2f4626c64
-
Filesize
110KB
MD5419799fc7f6ad2de9a5b969615d79205
SHA15a64b23c92b4ca569a2a6397b957ccc43f8d8b57
SHA256d87cac12f08bfc4953373198cf22316561087d0cff2c22df3616663bd06bf1e0
SHA512742c506fba77a3875cbf3d22a836db17191fb41849dd0e3e1437f1a4545270a7a963d60e87f123b932b5f97013817275fb51fd38d84039687b087de2f4626c64