Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
8f1d9382d5ec38exeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
8f1d9382d5ec38exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
8f1d9382d5ec38exeexeexeex.exe
-
Size
75KB
-
MD5
8f1d9382d5ec3860556c15decf8190b0
-
SHA1
134326e167f04e19734b21edb5f34382eba088d5
-
SHA256
79f892993ff775351a7ee1b7e52805747e37bb2ac8c8614f84ba2490f9acd9f8
-
SHA512
53a7553d8a3cdb24e70ba3e8bcac373ed268d5ecd62066e1991649c79d6678c0a6ce95692377f2fe8f1765cc9664e34c2b61dd70f6217d041c7a901bc85c6b9f
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfVtx:vCjsIOtEvwDpj5H9YvQd2J
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2344 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 3064 8f1d9382d5ec38exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2344 3064 8f1d9382d5ec38exeexeexeex.exe 27 PID 3064 wrote to memory of 2344 3064 8f1d9382d5ec38exeexeexeex.exe 27 PID 3064 wrote to memory of 2344 3064 8f1d9382d5ec38exeexeexeex.exe 27 PID 3064 wrote to memory of 2344 3064 8f1d9382d5ec38exeexeexeex.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f1d9382d5ec38exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\8f1d9382d5ec38exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2344
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5dab02e92672c4d19e84f93a4ecc3ac6c
SHA19245b08970dd68deb75e56fb0e3cb4626edbb03d
SHA256bba756070492d37a2e3c9d8f93fceb9b2374759c4a4a2605ddf669672ff35b1f
SHA512f6ba416550bcab70e618ea4b342946bc2789ae21d844be57794f4982b6554e2b193d81558fde46298fa73a88bfcf232f847f2bcc90eb4831ac0274aca7edf722
-
Filesize
76KB
MD5dab02e92672c4d19e84f93a4ecc3ac6c
SHA19245b08970dd68deb75e56fb0e3cb4626edbb03d
SHA256bba756070492d37a2e3c9d8f93fceb9b2374759c4a4a2605ddf669672ff35b1f
SHA512f6ba416550bcab70e618ea4b342946bc2789ae21d844be57794f4982b6554e2b193d81558fde46298fa73a88bfcf232f847f2bcc90eb4831ac0274aca7edf722
-
Filesize
76KB
MD5dab02e92672c4d19e84f93a4ecc3ac6c
SHA19245b08970dd68deb75e56fb0e3cb4626edbb03d
SHA256bba756070492d37a2e3c9d8f93fceb9b2374759c4a4a2605ddf669672ff35b1f
SHA512f6ba416550bcab70e618ea4b342946bc2789ae21d844be57794f4982b6554e2b193d81558fde46298fa73a88bfcf232f847f2bcc90eb4831ac0274aca7edf722