Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2023, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
c43de61777d5bcexeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
c43de61777d5bcexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
c43de61777d5bcexeexeexeex.exe
-
Size
43KB
-
MD5
c43de61777d5bc516c7247d2fe5e1ac3
-
SHA1
f80b6c831381ce0f08c676d73d476ed8af703347
-
SHA256
b237c7e0a9e977992d6bd6d4a6c279b129949a0f813d6aeba334f09f6bfd8b8f
-
SHA512
25114304a966a66d1b013b1d451cbeed6db42a33c318fd5faced28a7ead8da4c5c9561b16ee211a6b69d762c4513c0f31b8fc985bc1c9529b96a7c6a094ac7e2
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEq1xGb3y5:X6QFElP6n+gJQMOtEvwDpjB0mGbS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1276 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2144 c43de61777d5bcexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 1276 2144 c43de61777d5bcexeexeexeex.exe 27 PID 2144 wrote to memory of 1276 2144 c43de61777d5bcexeexeexeex.exe 27 PID 2144 wrote to memory of 1276 2144 c43de61777d5bcexeexeexeex.exe 27 PID 2144 wrote to memory of 1276 2144 c43de61777d5bcexeexeexeex.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c43de61777d5bcexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\c43de61777d5bcexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1276
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5c47376d388fb00bdcea9c98496175348
SHA1830ae2b22c53f43b5a04ca0ac08c4291de8b02cb
SHA256dfa6cb1fa107d9208f92bbf63d4d63a98bb5eab3b03f9a76c7d6b4fb6e9649c8
SHA51236010746b0334785c891f6b44a052741750b01e9c826b669fa6922f7eb3b95fcf41c4f58f6f2e0bdd5650f1739c5c8588d122ba0b7bc1e51a1c2474e148b1375
-
Filesize
43KB
MD5c47376d388fb00bdcea9c98496175348
SHA1830ae2b22c53f43b5a04ca0ac08c4291de8b02cb
SHA256dfa6cb1fa107d9208f92bbf63d4d63a98bb5eab3b03f9a76c7d6b4fb6e9649c8
SHA51236010746b0334785c891f6b44a052741750b01e9c826b669fa6922f7eb3b95fcf41c4f58f6f2e0bdd5650f1739c5c8588d122ba0b7bc1e51a1c2474e148b1375
-
Filesize
43KB
MD5c47376d388fb00bdcea9c98496175348
SHA1830ae2b22c53f43b5a04ca0ac08c4291de8b02cb
SHA256dfa6cb1fa107d9208f92bbf63d4d63a98bb5eab3b03f9a76c7d6b4fb6e9649c8
SHA51236010746b0334785c891f6b44a052741750b01e9c826b669fa6922f7eb3b95fcf41c4f58f6f2e0bdd5650f1739c5c8588d122ba0b7bc1e51a1c2474e148b1375