Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/07/2023, 12:40
Behavioral task
behavioral1
Sample
473692780b0df3exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
473692780b0df3exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
473692780b0df3exeexe_JC.exe
-
Size
90KB
-
MD5
473692780b0df346b3f69f5408be3f81
-
SHA1
7dc2340942d9de258a5df6b5ce72c0ddec83e849
-
SHA256
770baaa8024975567ae3a9448f3812f8bb0650f3c1ff51d9738a4c92207f153b
-
SHA512
5ade18e37a26d04fe7d893c87103fa10fdfa9165a33e2143b998ec1b3d4dcc1877699b8423fdda70bdd9091e30d9baf8423f2603c76810bfc56b3660d0363a63
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjztI:zCsanOtEvwDpjr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2352 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1924 473692780b0df3exeexe_JC.exe -
resource yara_rule behavioral1/memory/1924-54-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1924-68-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2352-70-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0009000000012023-69.dat upx behavioral1/files/0x0009000000012023-65.dat upx behavioral1/files/0x0009000000012023-79.dat upx behavioral1/memory/2352-80-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2352 1924 473692780b0df3exeexe_JC.exe 28 PID 1924 wrote to memory of 2352 1924 473692780b0df3exeexe_JC.exe 28 PID 1924 wrote to memory of 2352 1924 473692780b0df3exeexe_JC.exe 28 PID 1924 wrote to memory of 2352 1924 473692780b0df3exeexe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\473692780b0df3exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\473692780b0df3exeexe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2352
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5daaad3fc549db2069cd38131020c5729
SHA1bb429cbb7c3f29bfe60755288c6ab3f38e35e659
SHA2564b75f54d36e10802aad551cdd766bc17b56285b348eb7d93dfa29ad7c7048800
SHA512f6a5b8ef0d7ef3d9c9df358d75d10f81d62517bcf7ab2be1ed069bec91a862458b898085fa904b88e509d250c462183fd69465e9c4f68c3a56674688a73072ba
-
Filesize
90KB
MD5daaad3fc549db2069cd38131020c5729
SHA1bb429cbb7c3f29bfe60755288c6ab3f38e35e659
SHA2564b75f54d36e10802aad551cdd766bc17b56285b348eb7d93dfa29ad7c7048800
SHA512f6a5b8ef0d7ef3d9c9df358d75d10f81d62517bcf7ab2be1ed069bec91a862458b898085fa904b88e509d250c462183fd69465e9c4f68c3a56674688a73072ba
-
Filesize
90KB
MD5daaad3fc549db2069cd38131020c5729
SHA1bb429cbb7c3f29bfe60755288c6ab3f38e35e659
SHA2564b75f54d36e10802aad551cdd766bc17b56285b348eb7d93dfa29ad7c7048800
SHA512f6a5b8ef0d7ef3d9c9df358d75d10f81d62517bcf7ab2be1ed069bec91a862458b898085fa904b88e509d250c462183fd69465e9c4f68c3a56674688a73072ba