Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
11/07/2023, 18:00
Behavioral task
behavioral1
Sample
ff93ff6d2407d3exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
ff93ff6d2407d3exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
ff93ff6d2407d3exeexeexeex.exe
-
Size
99KB
-
MD5
ff93ff6d2407d362a6b7ae9993003095
-
SHA1
68360ad60ed8331ff493d16d411a60ba3c753636
-
SHA256
d6308045bef0112144759a5e9a06328bc15050db81327a9fb287f06433e09344
-
SHA512
efcc426dbd215ecb8d89b912abf5a2db6f91fb4fbf125b9331e1903eec667131019ace00e1f077b39582125b8ab8cd925fe917e017b8d5d40a6d126c520cc6dc
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQb6KJ:AnBdOOtEvwDpj6zp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1528 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2288 ff93ff6d2407d3exeexeexeex.exe -
resource yara_rule behavioral1/files/0x000c00000001224d-63.dat upx behavioral1/memory/2288-67-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000c00000001224d-66.dat upx behavioral1/files/0x000c00000001224d-75.dat upx behavioral1/memory/1528-76-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1528 2288 ff93ff6d2407d3exeexeexeex.exe 28 PID 2288 wrote to memory of 1528 2288 ff93ff6d2407d3exeexeexeex.exe 28 PID 2288 wrote to memory of 1528 2288 ff93ff6d2407d3exeexeexeex.exe 28 PID 2288 wrote to memory of 1528 2288 ff93ff6d2407d3exeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff93ff6d2407d3exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\ff93ff6d2407d3exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1528
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD55cbee2c9cdb466a23ea59852c06ee5d7
SHA1883c9551e5063d49da06af75d052ca14a88165c6
SHA25679ca4adb7b37002c703f379c27005724ab34b87a4aedc58d8f3f345e72090aeb
SHA51287990fd20fb1075d7f0baaa7de6c8f530e986870ca07599024fe366b8e6017fe28f3518a4b11c29d22bfd378de2bf0b40e543a77d07f743d6100509cc4b8d691
-
Filesize
99KB
MD55cbee2c9cdb466a23ea59852c06ee5d7
SHA1883c9551e5063d49da06af75d052ca14a88165c6
SHA25679ca4adb7b37002c703f379c27005724ab34b87a4aedc58d8f3f345e72090aeb
SHA51287990fd20fb1075d7f0baaa7de6c8f530e986870ca07599024fe366b8e6017fe28f3518a4b11c29d22bfd378de2bf0b40e543a77d07f743d6100509cc4b8d691
-
Filesize
99KB
MD55cbee2c9cdb466a23ea59852c06ee5d7
SHA1883c9551e5063d49da06af75d052ca14a88165c6
SHA25679ca4adb7b37002c703f379c27005724ab34b87a4aedc58d8f3f345e72090aeb
SHA51287990fd20fb1075d7f0baaa7de6c8f530e986870ca07599024fe366b8e6017fe28f3518a4b11c29d22bfd378de2bf0b40e543a77d07f743d6100509cc4b8d691