Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
8937136fbe7660exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
8937136fbe7660exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
8937136fbe7660exeexeexeex.exe
-
Size
45KB
-
MD5
8937136fbe7660f02ea4c58104544ad3
-
SHA1
78149633ac21cf259c7ad99a6719e4d5d740fb00
-
SHA256
41ae7f3a1647e3a3048791aad015c29303e103c0a3bf2777577486848a3d2ffa
-
SHA512
608dda7622bf554045cd1c199c91636aa22b37afb1ce7964dabe9561620f577c2b0bdaf486030679017c72f8938895f7d336ae9ac9582b6e46d8a205f60c7871
-
SSDEEP
768:79inqyNR/QtOOtEvwDpjBKdtGrP+bY/qxSIOMll:79mqyNhQMOtEvwDpjBxIOMll
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3012 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 8937136fbe7660exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 3012 2224 8937136fbe7660exeexeexeex.exe 29 PID 2224 wrote to memory of 3012 2224 8937136fbe7660exeexeexeex.exe 29 PID 2224 wrote to memory of 3012 2224 8937136fbe7660exeexeexeex.exe 29 PID 2224 wrote to memory of 3012 2224 8937136fbe7660exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8937136fbe7660exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\8937136fbe7660exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD51d5a1b21beab6e20698d9de56391c918
SHA1526f3788d0da116e49a5ea34449d27e29835873f
SHA2563f4d42ca3518e586ed91786665fffdbcb25f9a020407183a30b3320f278f8778
SHA5129ff3a174f0e5414f794a04833e3b5369f18fc4ae09113ac099482fbbbb9abfbef1738fbd16d5906e81cbf6df67fd51f4d015f2f919db69d4f86784b75653cc83
-
Filesize
45KB
MD51d5a1b21beab6e20698d9de56391c918
SHA1526f3788d0da116e49a5ea34449d27e29835873f
SHA2563f4d42ca3518e586ed91786665fffdbcb25f9a020407183a30b3320f278f8778
SHA5129ff3a174f0e5414f794a04833e3b5369f18fc4ae09113ac099482fbbbb9abfbef1738fbd16d5906e81cbf6df67fd51f4d015f2f919db69d4f86784b75653cc83
-
Filesize
45KB
MD51d5a1b21beab6e20698d9de56391c918
SHA1526f3788d0da116e49a5ea34449d27e29835873f
SHA2563f4d42ca3518e586ed91786665fffdbcb25f9a020407183a30b3320f278f8778
SHA5129ff3a174f0e5414f794a04833e3b5369f18fc4ae09113ac099482fbbbb9abfbef1738fbd16d5906e81cbf6df67fd51f4d015f2f919db69d4f86784b75653cc83