Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/07/2023, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
3ac1f6d92dc16fexeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3ac1f6d92dc16fexeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
3ac1f6d92dc16fexeexe_JC.exe
-
Size
102KB
-
MD5
3ac1f6d92dc16ff725da7e872850d2e7
-
SHA1
8052ee620938bda97691be964457658029915c9d
-
SHA256
ca960813ce03153cc5ead752d2f889e7ff406a95ef869ef35f1ee68729e76401
-
SHA512
e0a252059948eeba6268b98395a50884c4a180b73ccd284d76c978b528c5a6d86aec30a87b3fcef43a474b691f74cbec663b7747c58144d980197b2286a1379b
-
SSDEEP
768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWCCyDLKASkjolK5:xj+VGMOtEvwDpjubwQEIie8+ASk95
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2836 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2316 3ac1f6d92dc16fexeexe_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2836 2316 3ac1f6d92dc16fexeexe_JC.exe 28 PID 2316 wrote to memory of 2836 2316 3ac1f6d92dc16fexeexe_JC.exe 28 PID 2316 wrote to memory of 2836 2316 3ac1f6d92dc16fexeexe_JC.exe 28 PID 2316 wrote to memory of 2836 2316 3ac1f6d92dc16fexeexe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ac1f6d92dc16fexeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\3ac1f6d92dc16fexeexe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2836
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD5b55d763a9bb034a5e959d8cfba8feb9f
SHA16d105ac74a1f19e7338874765961ae30035c68e7
SHA256d961a3982e2690ed36404742d175cd7678e9e3ade84f38a2ce2662d4e1921f66
SHA512eb47f95797dc7562b7eb3c94c59ee2badd443b9cd914023d07c7a1b8e7f359c96cb03e1e25edf399a52e7adddbd077e0e3f3218de4842ab6fafacad5d143ce95
-
Filesize
102KB
MD5b55d763a9bb034a5e959d8cfba8feb9f
SHA16d105ac74a1f19e7338874765961ae30035c68e7
SHA256d961a3982e2690ed36404742d175cd7678e9e3ade84f38a2ce2662d4e1921f66
SHA512eb47f95797dc7562b7eb3c94c59ee2badd443b9cd914023d07c7a1b8e7f359c96cb03e1e25edf399a52e7adddbd077e0e3f3218de4842ab6fafacad5d143ce95
-
Filesize
102KB
MD5b55d763a9bb034a5e959d8cfba8feb9f
SHA16d105ac74a1f19e7338874765961ae30035c68e7
SHA256d961a3982e2690ed36404742d175cd7678e9e3ade84f38a2ce2662d4e1921f66
SHA512eb47f95797dc7562b7eb3c94c59ee2badd443b9cd914023d07c7a1b8e7f359c96cb03e1e25edf399a52e7adddbd077e0e3f3218de4842ab6fafacad5d143ce95