Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
11/07/2023, 08:04
Static task
static1
Behavioral task
behavioral1
Sample
ecbc5a0d8b4b04exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
ecbc5a0d8b4b04exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
ecbc5a0d8b4b04exeexeexeex.exe
-
Size
96KB
-
MD5
ecbc5a0d8b4b047b943a37bfe0637d5e
-
SHA1
bd3810173b4b33f047b1d0e4ea7124c8cfe4255c
-
SHA256
5a959462ee49d204e51ce94f924badc773159452e226915fb88dd487c2779d89
-
SHA512
891a01ac36e958f23caf11d50bff51809d1233f3e66a1db02b54f95d181883cf31fa16f7a1865b299a41433950630aa6c9cf870b6dcb44416dd1acedf173012b
-
SSDEEP
768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRiWCCy9lI6TI:i5nkFGMOtEvwDpjNbwQEIieqq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1680 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2664 ecbc5a0d8b4b04exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 1680 2664 ecbc5a0d8b4b04exeexeexeex.exe 29 PID 2664 wrote to memory of 1680 2664 ecbc5a0d8b4b04exeexeexeex.exe 29 PID 2664 wrote to memory of 1680 2664 ecbc5a0d8b4b04exeexeexeex.exe 29 PID 2664 wrote to memory of 1680 2664 ecbc5a0d8b4b04exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecbc5a0d8b4b04exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\ecbc5a0d8b4b04exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ed3f4d80cdce50d2fb2efa4fc4298e19
SHA19d7498dd5cb0d6b2bc66b35aea73e50c2d2abb72
SHA256e6bf06a64f89814e779f77c648ab04d23c4fdcf049c42bfa68b6884296b51b33
SHA512d6d00d3954d94485e6b063ce18329a342598b69276864d17fa20452052be450966c16532603b2a7543501d94486e1b17792340e7e9c82f16335c0b35c6c497c6
-
Filesize
96KB
MD5ed3f4d80cdce50d2fb2efa4fc4298e19
SHA19d7498dd5cb0d6b2bc66b35aea73e50c2d2abb72
SHA256e6bf06a64f89814e779f77c648ab04d23c4fdcf049c42bfa68b6884296b51b33
SHA512d6d00d3954d94485e6b063ce18329a342598b69276864d17fa20452052be450966c16532603b2a7543501d94486e1b17792340e7e9c82f16335c0b35c6c497c6
-
Filesize
96KB
MD5ed3f4d80cdce50d2fb2efa4fc4298e19
SHA19d7498dd5cb0d6b2bc66b35aea73e50c2d2abb72
SHA256e6bf06a64f89814e779f77c648ab04d23c4fdcf049c42bfa68b6884296b51b33
SHA512d6d00d3954d94485e6b063ce18329a342598b69276864d17fa20452052be450966c16532603b2a7543501d94486e1b17792340e7e9c82f16335c0b35c6c497c6