Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/07/2023, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
3540d1cb1d176cexeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3540d1cb1d176cexeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
3540d1cb1d176cexeexe_JC.exe
-
Size
58KB
-
MD5
3540d1cb1d176cda6a9c5448b612aab6
-
SHA1
ff0347b4ce219038ba00088f6a1f9e6921456403
-
SHA256
08dabffac926db1c3843b169485a0c70d93aef07e482650d37ad23d04d2fa2e0
-
SHA512
e75614350113aed92c8dae3ef5782c8a8c01d775bd9ac6c958b7ba0f97c62400abc0ac66c7b588a4d43d167ec2a14046f5998524045c18085bdc9891492fe96d
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HyCyh7vtRJ4BqKb1kWWx:vCjsIOtEvwDpj5Hv0F
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1868 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2060 3540d1cb1d176cexeexe_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1868 2060 3540d1cb1d176cexeexe_JC.exe 28 PID 2060 wrote to memory of 1868 2060 3540d1cb1d176cexeexe_JC.exe 28 PID 2060 wrote to memory of 1868 2060 3540d1cb1d176cexeexe_JC.exe 28 PID 2060 wrote to memory of 1868 2060 3540d1cb1d176cexeexe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3540d1cb1d176cexeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\3540d1cb1d176cexeexe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1868
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5910659afbd80cb07c251363fa07ef985
SHA136a7a31d0765e33eaed8017e2941606449e140f3
SHA256518dcfce921e8a108b6b8ac44a18f97b212fe790ffede17bb7d4cd8e4d6e32f4
SHA512ff1f2a01fc6e47fd1d650eda39ff2a7bc152e595fd5e0e109188e69db01f986d324d951a53e59f1fa5ee2e39fdc53542dd7407885e6efc5e4652a2eee103bbe9
-
Filesize
58KB
MD5910659afbd80cb07c251363fa07ef985
SHA136a7a31d0765e33eaed8017e2941606449e140f3
SHA256518dcfce921e8a108b6b8ac44a18f97b212fe790ffede17bb7d4cd8e4d6e32f4
SHA512ff1f2a01fc6e47fd1d650eda39ff2a7bc152e595fd5e0e109188e69db01f986d324d951a53e59f1fa5ee2e39fdc53542dd7407885e6efc5e4652a2eee103bbe9
-
Filesize
58KB
MD5910659afbd80cb07c251363fa07ef985
SHA136a7a31d0765e33eaed8017e2941606449e140f3
SHA256518dcfce921e8a108b6b8ac44a18f97b212fe790ffede17bb7d4cd8e4d6e32f4
SHA512ff1f2a01fc6e47fd1d650eda39ff2a7bc152e595fd5e0e109188e69db01f986d324d951a53e59f1fa5ee2e39fdc53542dd7407885e6efc5e4652a2eee103bbe9