Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
11/07/2023, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
e69504e28a48beexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
e69504e28a48beexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
e69504e28a48beexeexeexeex.exe
-
Size
36KB
-
MD5
e69504e28a48be536cff306e52406cdb
-
SHA1
ab95561a1344791949275becd489c98e15174e4d
-
SHA256
526a26254b75a017bc95fc82356176fb6696a61ca41cb69a5ca16bedc4d33ead
-
SHA512
7a543de52d6d3dd2d4697e224ffe251efc4bd58819a7abc8ce703c4f117c27b0a72707c8c2b83db4f4fecc24381ce084740a2fe55b9aebe3e314183e22c117b6
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4REL3hrMK:vj+jsMQMOtEvwDpj5H+MK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 800 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2424 e69504e28a48beexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 800 2424 e69504e28a48beexeexeexeex.exe 28 PID 2424 wrote to memory of 800 2424 e69504e28a48beexeexeexeex.exe 28 PID 2424 wrote to memory of 800 2424 e69504e28a48beexeexeexeex.exe 28 PID 2424 wrote to memory of 800 2424 e69504e28a48beexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e69504e28a48beexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\e69504e28a48beexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:800
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD50b6ba0c84f4f1a18f3875bacc0b23166
SHA135b3d4ce9e5d0b6606aa65e8ffc96e3846d66f8f
SHA256f276aaefdd81129c3df030f5269d05951de232de31c5f080cf1ebb0d844ad2ae
SHA512772bf310380addc3bc3fa4d261055005a0777fdbc6e7484d8076875fe955b8deed2956c36cbaeb87cd0e7a3c905a26c00d11a5cf7cc7216f24a0147cc1178a3a
-
Filesize
36KB
MD50b6ba0c84f4f1a18f3875bacc0b23166
SHA135b3d4ce9e5d0b6606aa65e8ffc96e3846d66f8f
SHA256f276aaefdd81129c3df030f5269d05951de232de31c5f080cf1ebb0d844ad2ae
SHA512772bf310380addc3bc3fa4d261055005a0777fdbc6e7484d8076875fe955b8deed2956c36cbaeb87cd0e7a3c905a26c00d11a5cf7cc7216f24a0147cc1178a3a
-
Filesize
36KB
MD50b6ba0c84f4f1a18f3875bacc0b23166
SHA135b3d4ce9e5d0b6606aa65e8ffc96e3846d66f8f
SHA256f276aaefdd81129c3df030f5269d05951de232de31c5f080cf1ebb0d844ad2ae
SHA512772bf310380addc3bc3fa4d261055005a0777fdbc6e7484d8076875fe955b8deed2956c36cbaeb87cd0e7a3c905a26c00d11a5cf7cc7216f24a0147cc1178a3a