Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
11/07/2023, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
f2bbbee16bd44dexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
f2bbbee16bd44dexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
f2bbbee16bd44dexeexeexeex.exe
-
Size
43KB
-
MD5
f2bbbee16bd44dcab887aa5f08365a6b
-
SHA1
878152fd4e7ec89de171c0788deb2ca77af3baca
-
SHA256
9283a2ad465697557c18bb889cf0a16e39ba1487fe793596645d54d54650c288
-
SHA512
752305939be472a5ef320089eb61e0b65e531389f855096d4443b19912391ca12e002a86d55871787d403da2cb8ed9741a64c88b39a57fb7ce827f7459a5f2fe
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVajSKm5uzOHxuliox4:X6QFElP6n+gJQMOtEvwDpjBcSKm5upJ4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2292 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2388 f2bbbee16bd44dexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2292 2388 f2bbbee16bd44dexeexeexeex.exe 28 PID 2388 wrote to memory of 2292 2388 f2bbbee16bd44dexeexeexeex.exe 28 PID 2388 wrote to memory of 2292 2388 f2bbbee16bd44dexeexeexeex.exe 28 PID 2388 wrote to memory of 2292 2388 f2bbbee16bd44dexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2bbbee16bd44dexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\f2bbbee16bd44dexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2292
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5eb5b09dc2aa348e627ec64fb18156867
SHA1877cbc7517364f20f9938a6d14a6e6ffe9cde0ef
SHA2562dc67ff12cd9a100ccb2e0b4fd6d1cbddd2410995b62f722cc59751abb0e851e
SHA512e1ec88a9c30ed5a99fad718d99f42fe5019443e295eef8397fdf93f433e8876a4908558b86c55e45d8fd2275cc72cae6f60feb5d1de3f97f4cb1b2bc622a2bd4
-
Filesize
43KB
MD5eb5b09dc2aa348e627ec64fb18156867
SHA1877cbc7517364f20f9938a6d14a6e6ffe9cde0ef
SHA2562dc67ff12cd9a100ccb2e0b4fd6d1cbddd2410995b62f722cc59751abb0e851e
SHA512e1ec88a9c30ed5a99fad718d99f42fe5019443e295eef8397fdf93f433e8876a4908558b86c55e45d8fd2275cc72cae6f60feb5d1de3f97f4cb1b2bc622a2bd4
-
Filesize
43KB
MD5eb5b09dc2aa348e627ec64fb18156867
SHA1877cbc7517364f20f9938a6d14a6e6ffe9cde0ef
SHA2562dc67ff12cd9a100ccb2e0b4fd6d1cbddd2410995b62f722cc59751abb0e851e
SHA512e1ec88a9c30ed5a99fad718d99f42fe5019443e295eef8397fdf93f433e8876a4908558b86c55e45d8fd2275cc72cae6f60feb5d1de3f97f4cb1b2bc622a2bd4