Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
11/07/2023, 06:59
Behavioral task
behavioral1
Sample
e530c1f44cf81bexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
e530c1f44cf81bexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
e530c1f44cf81bexeexeexeex.exe
-
Size
102KB
-
MD5
e530c1f44cf81bc01512b3518f9ffe9b
-
SHA1
7d5d751568c64d1fd253f36a4ea8b128bf091df1
-
SHA256
d48172531a997afe65bea4929f4920f70a3f43bcec5b07c98023d79612208018
-
SHA512
0f440013c103871e23da0becf69f8b641a94de522ab6530d84ea4634cb3868228c49f06669d8fc9a58beebd147d28a0f0543dcfad6c0c9114e3809a47986fd2f
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GR8A:1nK6a+qdOOtEvwDpjt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1832 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1236 e530c1f44cf81bexeexeexeex.exe -
resource yara_rule behavioral1/files/0x003c00000000f60a-63.dat upx behavioral1/memory/1236-67-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x003c00000000f60a-66.dat upx behavioral1/files/0x003c00000000f60a-75.dat upx behavioral1/memory/1832-76-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1236 wrote to memory of 1832 1236 e530c1f44cf81bexeexeexeex.exe 28 PID 1236 wrote to memory of 1832 1236 e530c1f44cf81bexeexeexeex.exe 28 PID 1236 wrote to memory of 1832 1236 e530c1f44cf81bexeexeexeex.exe 28 PID 1236 wrote to memory of 1832 1236 e530c1f44cf81bexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e530c1f44cf81bexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\e530c1f44cf81bexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1832
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD515a3a97c0aac307c42d4e9facccaf4da
SHA1c714fcfc4ea8948c895f3f557b4bf51ff5ed1397
SHA2561e14569268ae8a1d5f8c52ef3041c822b258915a499c4f7ea5bc2c6568492380
SHA512510d4accd54445cc7990ec17d1fec590b988bb43aa25a25305191d3e147a7a2c16bc92b4f3d99c3284ba4ae866ef85c97bdfcade06f6b246928dd55820af4dbc
-
Filesize
102KB
MD515a3a97c0aac307c42d4e9facccaf4da
SHA1c714fcfc4ea8948c895f3f557b4bf51ff5ed1397
SHA2561e14569268ae8a1d5f8c52ef3041c822b258915a499c4f7ea5bc2c6568492380
SHA512510d4accd54445cc7990ec17d1fec590b988bb43aa25a25305191d3e147a7a2c16bc92b4f3d99c3284ba4ae866ef85c97bdfcade06f6b246928dd55820af4dbc
-
Filesize
102KB
MD515a3a97c0aac307c42d4e9facccaf4da
SHA1c714fcfc4ea8948c895f3f557b4bf51ff5ed1397
SHA2561e14569268ae8a1d5f8c52ef3041c822b258915a499c4f7ea5bc2c6568492380
SHA512510d4accd54445cc7990ec17d1fec590b988bb43aa25a25305191d3e147a7a2c16bc92b4f3d99c3284ba4ae866ef85c97bdfcade06f6b246928dd55820af4dbc