Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
10/07/2023, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
cad7c87b37b11eexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
cad7c87b37b11eexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
cad7c87b37b11eexeexeexeex.exe
-
Size
57KB
-
MD5
cad7c87b37b11e7a8aaad1c710864da5
-
SHA1
04879197e6c53bb79306972591cd443b1be3c3b5
-
SHA256
107368ac619dc37c809cceb4954cc4f019cd0f87ed68b7dacb324556d5c0b681
-
SHA512
525713f0a5ff9d98e035645f69e7edcbb04ff75929cc66bbe3868f8720966b7612d66249e9d1f9de9e5d9dbef4011b38c27cc045e9a9fd3e0aa4f5eba436b69a
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZn7Y:X6a+SOtEvwDpjBrOU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 696 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 cad7c87b37b11eexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 696 2872 cad7c87b37b11eexeexeexeex.exe 29 PID 2872 wrote to memory of 696 2872 cad7c87b37b11eexeexeexeex.exe 29 PID 2872 wrote to memory of 696 2872 cad7c87b37b11eexeexeexeex.exe 29 PID 2872 wrote to memory of 696 2872 cad7c87b37b11eexeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cad7c87b37b11eexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\cad7c87b37b11eexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:696
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5f0857c82ba27770d3a87de8439dbf695
SHA12cc929ad5e48a5f10838aaee3bd9ac73ebb8dfd0
SHA256226f0d062da830fbf675a51870e7be9f58985b5982ef7550628a6a24c0503307
SHA51295aa0b3ead0859a255a500d7fa7c2b8948bf1d6fd97c63474f24fd8664332c18094a9a7e728f2a5085fbdf5285abb24581e3514977d6bd4fea8c214ab7b78c9f
-
Filesize
57KB
MD5f0857c82ba27770d3a87de8439dbf695
SHA12cc929ad5e48a5f10838aaee3bd9ac73ebb8dfd0
SHA256226f0d062da830fbf675a51870e7be9f58985b5982ef7550628a6a24c0503307
SHA51295aa0b3ead0859a255a500d7fa7c2b8948bf1d6fd97c63474f24fd8664332c18094a9a7e728f2a5085fbdf5285abb24581e3514977d6bd4fea8c214ab7b78c9f
-
Filesize
57KB
MD5f0857c82ba27770d3a87de8439dbf695
SHA12cc929ad5e48a5f10838aaee3bd9ac73ebb8dfd0
SHA256226f0d062da830fbf675a51870e7be9f58985b5982ef7550628a6a24c0503307
SHA51295aa0b3ead0859a255a500d7fa7c2b8948bf1d6fd97c63474f24fd8664332c18094a9a7e728f2a5085fbdf5285abb24581e3514977d6bd4fea8c214ab7b78c9f