Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/07/2023, 12:39 UTC
Static task
static1
Behavioral task
behavioral1
Sample
46fc7dbfbfc689exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
46fc7dbfbfc689exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
46fc7dbfbfc689exeexe_JC.exe
-
Size
75KB
-
MD5
46fc7dbfbfc6894483495ed6c1c03dfa
-
SHA1
1eb147f1822cdf52346c8ca12584942712760604
-
SHA256
9b57bfde616d3b16a555f75e5ccdf01522f5f15a176aaffc2dac72f8d40afe67
-
SHA512
fb0e35b84d2378e2f079740930bdfe8ed9b07317e348bb1f0f4c5873e4459b19b3610a844840267c626a8e96dc1e8e97c7b57bdd092b8fc6b8b4ee683f7e5334
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfVtd:vCjsIOtEvwDpj5H9YvQd21
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2604 46fc7dbfbfc689exeexe_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2036 2604 46fc7dbfbfc689exeexe_JC.exe 28 PID 2604 wrote to memory of 2036 2604 46fc7dbfbfc689exeexe_JC.exe 28 PID 2604 wrote to memory of 2036 2604 46fc7dbfbfc689exeexe_JC.exe 28 PID 2604 wrote to memory of 2036 2604 46fc7dbfbfc689exeexe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\46fc7dbfbfc689exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\46fc7dbfbfc689exeexe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2036
-
Network
-
Remote address:8.8.8.8:53Requestbestccc.comIN AResponsebestccc.comIN A103.14.121.240
-
392 B 219 B 5 5
-
354 B 219 B 5 5
-
288 B 219 B 5 5
-
190 B 92 B 4 2
-
152 B 3
-
392 B 219 B 5 5
-
152 B 3
-
354 B 219 B 5 5
-
288 B 219 B 5 5
-
190 B 92 B 4 2
-
392 B 219 B 5 5
-
152 B 3
-
354 B 219 B 5 5
-
288 B 219 B 5 5
-
152 B 3
-
152 B 3
-
190 B 132 B 4 3
-
392 B 219 B 5 5
-
354 B 219 B 5 5
-
152 B 3
-
288 B 219 B 5 5
-
190 B 92 B 4 2
-
392 B 219 B 5 5
-
354 B 219 B 5 5
-
288 B 219 B 5 5
-
190 B 92 B 4 2
-
392 B 219 B 5 5
-
354 B 219 B 5 5
-
288 B 219 B 5 5
-
190 B 132 B 4 3
-
438 B 259 B 6 6
-
354 B 219 B 5 5
-
334 B 219 B 6 5
-
190 B 92 B 4 2
-
392 B 219 B 5 5
-
354 B 219 B 5 5
-
288 B 219 B 5 5
-
190 B 92 B 4 2
-
392 B 219 B 5 5
-
152 B 3
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5559560e9ecb677e78c77b91edce16fc5
SHA1b205c37c3f825dbd4806a537a0f052d245fd4b27
SHA25680a7e127da22831b4e25e1517f075190ef8ab053e4de5ea3e724fe86829b998d
SHA5129b5d6d60e9f48b4920bf36659f696aa875db37aa4084192b90224f3cb2fe48e81a2fe5caa3f683954077f8c861882d2b799a26e4a37bc90700fcb586a701291c
-
Filesize
75KB
MD5559560e9ecb677e78c77b91edce16fc5
SHA1b205c37c3f825dbd4806a537a0f052d245fd4b27
SHA25680a7e127da22831b4e25e1517f075190ef8ab053e4de5ea3e724fe86829b998d
SHA5129b5d6d60e9f48b4920bf36659f696aa875db37aa4084192b90224f3cb2fe48e81a2fe5caa3f683954077f8c861882d2b799a26e4a37bc90700fcb586a701291c
-
Filesize
75KB
MD5559560e9ecb677e78c77b91edce16fc5
SHA1b205c37c3f825dbd4806a537a0f052d245fd4b27
SHA25680a7e127da22831b4e25e1517f075190ef8ab053e4de5ea3e724fe86829b998d
SHA5129b5d6d60e9f48b4920bf36659f696aa875db37aa4084192b90224f3cb2fe48e81a2fe5caa3f683954077f8c861882d2b799a26e4a37bc90700fcb586a701291c