Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
b6ced86fecc89bexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
b6ced86fecc89bexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
b6ced86fecc89bexeexeexeex.exe
-
Size
36KB
-
MD5
b6ced86fecc89ba8e2892cdccc4246e1
-
SHA1
926429817f112750916ae035da1c1782a672a1c1
-
SHA256
ce76b16f3cf9dae91ccfd2a05cfd906b58b0daf4244b841589f30a62858b47b9
-
SHA512
b70662c4c9f84cfd0638ccaa2d2cb1adf64b0fcb8955f983bd984b5bc63ace649646ad9ae7f5b211236bd6214f5fe693e5668518d00bef99d4a805356fd53d8e
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf6XT+72kmGYjllM0:bgX4zYcgTEu6QOaryfjqDlC7rYZlM0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2324 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2364 b6ced86fecc89bexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2324 2364 b6ced86fecc89bexeexeexeex.exe 28 PID 2364 wrote to memory of 2324 2364 b6ced86fecc89bexeexeexeex.exe 28 PID 2364 wrote to memory of 2324 2364 b6ced86fecc89bexeexeexeex.exe 28 PID 2364 wrote to memory of 2324 2364 b6ced86fecc89bexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6ced86fecc89bexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\b6ced86fecc89bexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2324
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5f3437da2ce60f5782a37bae28e89f90f
SHA114da8ded322f84d259cfaccc5e85a8c8fb909ea1
SHA2560ad5c3b4b8c632a766ba19898ce73c5d93b0686bf68889ab70e807a27928820b
SHA51285b250bd39ac633e4e1f8ce2ebfa4ae9878bb37b5d8251b5c2cf901498e123004bf2afda7c3802b819a755676c035005278c137d35ed67ff1fc8c6d8fca83106
-
Filesize
37KB
MD5f3437da2ce60f5782a37bae28e89f90f
SHA114da8ded322f84d259cfaccc5e85a8c8fb909ea1
SHA2560ad5c3b4b8c632a766ba19898ce73c5d93b0686bf68889ab70e807a27928820b
SHA51285b250bd39ac633e4e1f8ce2ebfa4ae9878bb37b5d8251b5c2cf901498e123004bf2afda7c3802b819a755676c035005278c137d35ed67ff1fc8c6d8fca83106
-
Filesize
37KB
MD5f3437da2ce60f5782a37bae28e89f90f
SHA114da8ded322f84d259cfaccc5e85a8c8fb909ea1
SHA2560ad5c3b4b8c632a766ba19898ce73c5d93b0686bf68889ab70e807a27928820b
SHA51285b250bd39ac633e4e1f8ce2ebfa4ae9878bb37b5d8251b5c2cf901498e123004bf2afda7c3802b819a755676c035005278c137d35ed67ff1fc8c6d8fca83106