Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 09:21
Behavioral task
behavioral1
Sample
a8cb59d12bb69bexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
a8cb59d12bb69bexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
a8cb59d12bb69bexeexeexeex.exe
-
Size
90KB
-
MD5
a8cb59d12bb69b9dce2d237e43127ad0
-
SHA1
d6702e55a96793c0037cb2d416836bf0b0b0ba04
-
SHA256
aaf31b2a241706a5f2dc50cb4993da803c60970cc12746eb3ce14ef45a725459
-
SHA512
16c86989fdf8521055e4d23667a199a0f8a775f79648039d49c70f355ab309b8f69ff3b14e8cb8ebabc7fcc10b7187dde817af4d8b73c7f4f312e288b3368339
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuv4:zCsanOtEvwDpjg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1272 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 440 a8cb59d12bb69bexeexeexeex.exe -
resource yara_rule behavioral1/files/0x000c000000012260-63.dat upx behavioral1/memory/440-67-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000c000000012260-66.dat upx behavioral1/files/0x000c000000012260-75.dat upx behavioral1/memory/1272-76-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 440 wrote to memory of 1272 440 a8cb59d12bb69bexeexeexeex.exe 28 PID 440 wrote to memory of 1272 440 a8cb59d12bb69bexeexeexeex.exe 28 PID 440 wrote to memory of 1272 440 a8cb59d12bb69bexeexeexeex.exe 28 PID 440 wrote to memory of 1272 440 a8cb59d12bb69bexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8cb59d12bb69bexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\a8cb59d12bb69bexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5b09ee306e8e88328cff2c5a13f10d7a8
SHA133399f709d03de69ac69b3b3a93c385651d8d844
SHA256ea0245f64aaaca703a864621e277a16595987f0b2243b4edbbf704a901826107
SHA51219346fa48d654577cf67aec75344fa287bcfbebfda3a9ccd2fb3d0a4519104bff1539d5b9c6b310af1ab3c2ce2238b76c9998aed31972498ee809a569c8e8d46
-
Filesize
91KB
MD5b09ee306e8e88328cff2c5a13f10d7a8
SHA133399f709d03de69ac69b3b3a93c385651d8d844
SHA256ea0245f64aaaca703a864621e277a16595987f0b2243b4edbbf704a901826107
SHA51219346fa48d654577cf67aec75344fa287bcfbebfda3a9ccd2fb3d0a4519104bff1539d5b9c6b310af1ab3c2ce2238b76c9998aed31972498ee809a569c8e8d46
-
Filesize
91KB
MD5b09ee306e8e88328cff2c5a13f10d7a8
SHA133399f709d03de69ac69b3b3a93c385651d8d844
SHA256ea0245f64aaaca703a864621e277a16595987f0b2243b4edbbf704a901826107
SHA51219346fa48d654577cf67aec75344fa287bcfbebfda3a9ccd2fb3d0a4519104bff1539d5b9c6b310af1ab3c2ce2238b76c9998aed31972498ee809a569c8e8d46