Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2023, 07:38
Behavioral task
behavioral1
Sample
ea0df7468e8d41exeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
ea0df7468e8d41exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
ea0df7468e8d41exeexeexeex.exe
-
Size
70KB
-
MD5
ea0df7468e8d41d19ed5cc398711e344
-
SHA1
352d0851678ebf6fb0569e04386b62beaa90531d
-
SHA256
7fe0b154de530950060dd5066d6919cab1989fe57c60f46e0a9050393c38a6f3
-
SHA512
5e15ffe736e24899d10a8d2f465553c8be432c88b83b38dc1d15008bb1202fde8b938bf931aa573943a6915676f0cdb7fe37b301c9c3fe87c8822d3451da745b
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYfKhBUzbTP:1nK6a+qdOOtEvwDpjK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2912 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2868 ea0df7468e8d41exeexeexeex.exe -
resource yara_rule behavioral1/files/0x0006000000012112-63.dat upx behavioral1/memory/2868-66-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x0006000000012112-67.dat upx behavioral1/files/0x0006000000012112-75.dat upx behavioral1/memory/2912-76-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2912 2868 ea0df7468e8d41exeexeexeex.exe 27 PID 2868 wrote to memory of 2912 2868 ea0df7468e8d41exeexeexeex.exe 27 PID 2868 wrote to memory of 2912 2868 ea0df7468e8d41exeexeexeex.exe 27 PID 2868 wrote to memory of 2912 2868 ea0df7468e8d41exeexeexeex.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea0df7468e8d41exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\ea0df7468e8d41exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2912
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5828c1f0161d6b07e1f82d48e95cb5214
SHA1ef1dc342b963581038f9d9a4aece15dc7ff94fed
SHA25686f6d0e319926946c35c15c2b2be621dbcc450838751cbe263594e8f9c0e8805
SHA5128938777f2184a4a14cc8d4a158a7a735cea3a7f32c79021ea72d8098d6ae24146e0dc620127f9deaeb0c23c93740243bbe16e840d4300cfc22cac00dc2a60f8b
-
Filesize
70KB
MD5828c1f0161d6b07e1f82d48e95cb5214
SHA1ef1dc342b963581038f9d9a4aece15dc7ff94fed
SHA25686f6d0e319926946c35c15c2b2be621dbcc450838751cbe263594e8f9c0e8805
SHA5128938777f2184a4a14cc8d4a158a7a735cea3a7f32c79021ea72d8098d6ae24146e0dc620127f9deaeb0c23c93740243bbe16e840d4300cfc22cac00dc2a60f8b
-
Filesize
70KB
MD5828c1f0161d6b07e1f82d48e95cb5214
SHA1ef1dc342b963581038f9d9a4aece15dc7ff94fed
SHA25686f6d0e319926946c35c15c2b2be621dbcc450838751cbe263594e8f9c0e8805
SHA5128938777f2184a4a14cc8d4a158a7a735cea3a7f32c79021ea72d8098d6ae24146e0dc620127f9deaeb0c23c93740243bbe16e840d4300cfc22cac00dc2a60f8b