Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230705-en
  • resource tags

    arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2023, 07:38

General

  • Target

    ea0df7468e8d41exeexeexeex.exe

  • Size

    70KB

  • MD5

    ea0df7468e8d41d19ed5cc398711e344

  • SHA1

    352d0851678ebf6fb0569e04386b62beaa90531d

  • SHA256

    7fe0b154de530950060dd5066d6919cab1989fe57c60f46e0a9050393c38a6f3

  • SHA512

    5e15ffe736e24899d10a8d2f465553c8be432c88b83b38dc1d15008bb1202fde8b938bf931aa573943a6915676f0cdb7fe37b301c9c3fe87c8822d3451da745b

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYfKhBUzbTP:1nK6a+qdOOtEvwDpjK

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea0df7468e8d41exeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\ea0df7468e8d41exeexeexeex.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    70KB

    MD5

    828c1f0161d6b07e1f82d48e95cb5214

    SHA1

    ef1dc342b963581038f9d9a4aece15dc7ff94fed

    SHA256

    86f6d0e319926946c35c15c2b2be621dbcc450838751cbe263594e8f9c0e8805

    SHA512

    8938777f2184a4a14cc8d4a158a7a735cea3a7f32c79021ea72d8098d6ae24146e0dc620127f9deaeb0c23c93740243bbe16e840d4300cfc22cac00dc2a60f8b

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    70KB

    MD5

    828c1f0161d6b07e1f82d48e95cb5214

    SHA1

    ef1dc342b963581038f9d9a4aece15dc7ff94fed

    SHA256

    86f6d0e319926946c35c15c2b2be621dbcc450838751cbe263594e8f9c0e8805

    SHA512

    8938777f2184a4a14cc8d4a158a7a735cea3a7f32c79021ea72d8098d6ae24146e0dc620127f9deaeb0c23c93740243bbe16e840d4300cfc22cac00dc2a60f8b

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    70KB

    MD5

    828c1f0161d6b07e1f82d48e95cb5214

    SHA1

    ef1dc342b963581038f9d9a4aece15dc7ff94fed

    SHA256

    86f6d0e319926946c35c15c2b2be621dbcc450838751cbe263594e8f9c0e8805

    SHA512

    8938777f2184a4a14cc8d4a158a7a735cea3a7f32c79021ea72d8098d6ae24146e0dc620127f9deaeb0c23c93740243bbe16e840d4300cfc22cac00dc2a60f8b

  • memory/2868-54-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2868-55-0x00000000004A0000-0x00000000004A6000-memory.dmp

    Filesize

    24KB

  • memory/2868-66-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/2912-69-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB

  • memory/2912-76-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB