Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 17:16
Static task
static1
Behavioral task
behavioral1
Sample
8a2a67a3e5771aexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
8a2a67a3e5771aexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
8a2a67a3e5771aexeexeexeex.exe
-
Size
4.4MB
-
MD5
8a2a67a3e5771a8dbd7984ae88e41608
-
SHA1
732eca26b1e398cf531c5c4aa9e0c3feac09a25c
-
SHA256
bd61f9c97ebaf0bfba6518b135afcffb2a4a39486d1ea9f3b7acb89e4e524af2
-
SHA512
ecf53bc2cce00c10aedb94ec1d2b8d23b2f915c35265f14707b192321e538b67dbb3148434e0f1c364aac204e30035e4f51f98cbf7a0906901161596b2250fb8
-
SSDEEP
98304:ymY+5/pjcv38VmLLWPk7nYDeNjZlXCGFk+nFbj+Y/WFqbOH:ymY+Rp4EViYkjYDeNVll2me/H
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2244 launch_.exe -
Loads dropped DLL 2 IoCs
pid Process 2132 8a2a67a3e5771aexeexeexeex.exe 2244 launch_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2244 launch_.exe 2244 launch_.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2964 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2964 AUDIODG.EXE Token: 33 2964 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2964 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2132 8a2a67a3e5771aexeexeexeex.exe 2244 launch_.exe 2244 launch_.exe 2244 launch_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2244 2132 8a2a67a3e5771aexeexeexeex.exe 29 PID 2132 wrote to memory of 2244 2132 8a2a67a3e5771aexeexeexeex.exe 29 PID 2132 wrote to memory of 2244 2132 8a2a67a3e5771aexeexeexeex.exe 29 PID 2132 wrote to memory of 2244 2132 8a2a67a3e5771aexeexeexeex.exe 29 PID 2132 wrote to memory of 2244 2132 8a2a67a3e5771aexeexeexeex.exe 29 PID 2132 wrote to memory of 2244 2132 8a2a67a3e5771aexeexeexeex.exe 29 PID 2132 wrote to memory of 2244 2132 8a2a67a3e5771aexeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a2a67a3e5771aexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\8a2a67a3e5771aexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\launch_temp_0\launch_.exe"C:\Users\Admin\AppData\Local\Temp\launch_temp_0\launch_.exe" "SFXSOURCE:C:\Users\Admin\AppData\Local\Temp\8a2a67a3e5771aexeexeexeex.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2244
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5a41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5e08c9eb2a8bb5390d6ef717f49cd1b3c
SHA1b91c4674b4e72c2083a9d7f1782254ab22430abb
SHA256db43ec5600f9f79390c7611d70849c7f670257ee852e75530f0862b213e63dfb
SHA512fdc02ec12e72839a930b51e285f1ebc8e95a4e0611488b8ac003137d304d0c19e0a20153ae776c9bc684cda68f24f05ca86725623b911a2f72ba593c65779891
-
Filesize
14KB
MD5e08c9eb2a8bb5390d6ef717f49cd1b3c
SHA1b91c4674b4e72c2083a9d7f1782254ab22430abb
SHA256db43ec5600f9f79390c7611d70849c7f670257ee852e75530f0862b213e63dfb
SHA512fdc02ec12e72839a930b51e285f1ebc8e95a4e0611488b8ac003137d304d0c19e0a20153ae776c9bc684cda68f24f05ca86725623b911a2f72ba593c65779891
-
Filesize
111KB
MD5aaa7d3439043a5499d9286afec312365
SHA10bbfef7a66b6c497331c812967d5891aea6962a5
SHA2562900110bf4de2c2cdcd3c8673735a67b9016d799d64c7fd6883826723d04cddc
SHA5121ac566becf6762a517d6e7636b5e1483c0d9c2c1922b0f8624f12335060f40fe11acfbc76b156ab42c3536cffe35ae448df70ff1990745fb7eb91736414853bd
-
Filesize
1KB
MD50865edc79be2e94ee8e45d3de2123812
SHA1a567e82b67250413ad01bce57a5364d07f6454f0
SHA256782a4e49b1cb0242f4de756124ef6d80789d3289b858cc6430cdf1036794b64b
SHA5129a501d2ecb5e3398088a8550f0841ece60d3ddc2570c13dadd208eea8acd3670a00604c6f2d1a7993adad66b7813715aab18f7d88afc8e68afdb44ee58cfbbc5
-
Filesize
1.1MB
MD5e1325ff186e46300a33cdd565a0c2ba9
SHA1dca04cf5c1b4bd262935eb4fb9dac2687ecde78d
SHA25639b1a5cdfe7760e2f99b2591e56f9ad330f33c069eb294159191f99bf26eac62
SHA512133077aed97fffff4634aaadd7bca0808181d4dcbb144b9c45f39920b3ef13ccf9589feaf3136577110301febd56b42c74a1ebe58090fd19aed96e7db227cd31
-
Filesize
5.0MB
MD5ec891c754be678aff41a32d5a633921d
SHA16160c67421798db6f39db64eb44d46a780673886
SHA256ad7bebd597faafc72922de08263271edff8db17b193684464e8f091e80970e6a
SHA5129a824e53f11f5f8b87fab0e458c1a671b8663eb94cf11483a6e4c84d8f06f0387cbac96e706e6c35751918c6a8acd789e6562fc7b0daa568e6149e41a9d59cae
-
Filesize
5.0MB
MD5ec891c754be678aff41a32d5a633921d
SHA16160c67421798db6f39db64eb44d46a780673886
SHA256ad7bebd597faafc72922de08263271edff8db17b193684464e8f091e80970e6a
SHA5129a824e53f11f5f8b87fab0e458c1a671b8663eb94cf11483a6e4c84d8f06f0387cbac96e706e6c35751918c6a8acd789e6562fc7b0daa568e6149e41a9d59cae
-
Filesize
5.0MB
MD5ec891c754be678aff41a32d5a633921d
SHA16160c67421798db6f39db64eb44d46a780673886
SHA256ad7bebd597faafc72922de08263271edff8db17b193684464e8f091e80970e6a
SHA5129a824e53f11f5f8b87fab0e458c1a671b8663eb94cf11483a6e4c84d8f06f0387cbac96e706e6c35751918c6a8acd789e6562fc7b0daa568e6149e41a9d59cae
-
Filesize
327KB
MD550f1d9f2093914c7712068608f3d66f2
SHA1c38c655526b9ba929f01259cd35abb65744448f0
SHA256ebeb211dfe4fce993d63206b2e3f284b569274db4730a8ee341ee81eccac9a5f
SHA51207841d260770288f34b3e6413f6044742d82794d0812d9d58ebb2b881f935ee7661c94acddcf3a25817a98168789de0e0e0a98baaddbac2ec097a3efdd22c9ac
-
Filesize
5.0MB
MD5ec891c754be678aff41a32d5a633921d
SHA16160c67421798db6f39db64eb44d46a780673886
SHA256ad7bebd597faafc72922de08263271edff8db17b193684464e8f091e80970e6a
SHA5129a824e53f11f5f8b87fab0e458c1a671b8663eb94cf11483a6e4c84d8f06f0387cbac96e706e6c35751918c6a8acd789e6562fc7b0daa568e6149e41a9d59cae
-
Filesize
327KB
MD550f1d9f2093914c7712068608f3d66f2
SHA1c38c655526b9ba929f01259cd35abb65744448f0
SHA256ebeb211dfe4fce993d63206b2e3f284b569274db4730a8ee341ee81eccac9a5f
SHA51207841d260770288f34b3e6413f6044742d82794d0812d9d58ebb2b881f935ee7661c94acddcf3a25817a98168789de0e0e0a98baaddbac2ec097a3efdd22c9ac