Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
10/07/2023, 18:43
Behavioral task
behavioral1
Sample
dd56b0bd285655exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
dd56b0bd285655exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
dd56b0bd285655exeexeexeex.exe
-
Size
90KB
-
MD5
dd56b0bd285655a8c1495268c9957491
-
SHA1
b32f82a5217c12d87d783b48a67c634c3d337089
-
SHA256
27c288540af295395fbaa8006cda9f1691f7eabccb5c92f318160a071fb7ea2c
-
SHA512
5af9f5388da1bc9def3a1384777ddaff12edc1001622e7ae98549587ebc203fb11f4285140ad5242309290efd3d156cba1cf27e1b3f1f4a7ae4db4c475083a7c
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpMx75j:AnBdOOtEvwDpj6z5j
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2200 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1800 dd56b0bd285655exeexeexeex.exe -
resource yara_rule behavioral1/memory/1800-66-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x003c00000000f60a-63.dat upx behavioral1/files/0x003c00000000f60a-67.dat upx behavioral1/files/0x003c00000000f60a-75.dat upx behavioral1/memory/2200-76-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2200 1800 dd56b0bd285655exeexeexeex.exe 28 PID 1800 wrote to memory of 2200 1800 dd56b0bd285655exeexeexeex.exe 28 PID 1800 wrote to memory of 2200 1800 dd56b0bd285655exeexeexeex.exe 28 PID 1800 wrote to memory of 2200 1800 dd56b0bd285655exeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd56b0bd285655exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\dd56b0bd285655exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2200
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD55ee153bfd6dbfcd7fc055d271865fce0
SHA16b125375f2678ed5239b0854fe5a853400e3e5fc
SHA2569fb1865a3eb1286b8a924c425a31f23f099a0ac9f912beebdf56a76c1533fa7e
SHA5124883471f6f2532d67cff65126154a38c50898994aacdb16beaef63c76ba1b4e9cecf8365c932098b13e8d714a0e9b38e3aa5848379ba13cdc07e597f5f829d63
-
Filesize
90KB
MD55ee153bfd6dbfcd7fc055d271865fce0
SHA16b125375f2678ed5239b0854fe5a853400e3e5fc
SHA2569fb1865a3eb1286b8a924c425a31f23f099a0ac9f912beebdf56a76c1533fa7e
SHA5124883471f6f2532d67cff65126154a38c50898994aacdb16beaef63c76ba1b4e9cecf8365c932098b13e8d714a0e9b38e3aa5848379ba13cdc07e597f5f829d63
-
Filesize
90KB
MD55ee153bfd6dbfcd7fc055d271865fce0
SHA16b125375f2678ed5239b0854fe5a853400e3e5fc
SHA2569fb1865a3eb1286b8a924c425a31f23f099a0ac9f912beebdf56a76c1533fa7e
SHA5124883471f6f2532d67cff65126154a38c50898994aacdb16beaef63c76ba1b4e9cecf8365c932098b13e8d714a0e9b38e3aa5848379ba13cdc07e597f5f829d63