Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16/07/2023, 08:26
Behavioral task
behavioral1
Sample
5a07f2c5c4432d_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5a07f2c5c4432d_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
5a07f2c5c4432d_JC.exe
-
Size
90KB
-
MD5
5a07f2c5c4432dfcd0b716d7a840ad9e
-
SHA1
ccd4ba500a255ef5a1a01ffc7f2479c98b082b3a
-
SHA256
011cabb8f5417a4a4e482429812d168e548ba89ef5b14a1a89092ee31a854499
-
SHA512
3824aa0908d2a41c575994d67361101c2cd472b6e83f01c94869cfd8246c3f6722aff1cf69d3dfcf658fa6fde5780a6fea20a7abb3665b3eb2469f49659b7111
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDWTHeTy:zCsanOtEvwDpjn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2836 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1808 5a07f2c5c4432d_JC.exe -
resource yara_rule behavioral1/memory/1808-54-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0009000000012028-70.dat upx behavioral1/memory/1808-69-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0009000000012028-65.dat upx behavioral1/memory/2836-71-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0009000000012028-80.dat upx behavioral1/memory/2836-82-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2836 1808 5a07f2c5c4432d_JC.exe 28 PID 1808 wrote to memory of 2836 1808 5a07f2c5c4432d_JC.exe 28 PID 1808 wrote to memory of 2836 1808 5a07f2c5c4432d_JC.exe 28 PID 1808 wrote to memory of 2836 1808 5a07f2c5c4432d_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a07f2c5c4432d_JC.exe"C:\Users\Admin\AppData\Local\Temp\5a07f2c5c4432d_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2836
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5a08cfdd7e54d18ecbc88e448d3ab430b
SHA102566b473603fccea88928b6ea1f67ee270fa12e
SHA256f095035d347217c4f94f84932f6a618b971b3c4f2b03bd2898020cb08c3f36f1
SHA512a572f4a67311a2923462afd70e10a10d2c86f5cd45f1efdea9f660942d8fece61cb3d8cc2e44abac77312e01174edd40efcbd97853e6a39a4e5bb23f36ea3eae
-
Filesize
90KB
MD5a08cfdd7e54d18ecbc88e448d3ab430b
SHA102566b473603fccea88928b6ea1f67ee270fa12e
SHA256f095035d347217c4f94f84932f6a618b971b3c4f2b03bd2898020cb08c3f36f1
SHA512a572f4a67311a2923462afd70e10a10d2c86f5cd45f1efdea9f660942d8fece61cb3d8cc2e44abac77312e01174edd40efcbd97853e6a39a4e5bb23f36ea3eae
-
Filesize
90KB
MD5a08cfdd7e54d18ecbc88e448d3ab430b
SHA102566b473603fccea88928b6ea1f67ee270fa12e
SHA256f095035d347217c4f94f84932f6a618b971b3c4f2b03bd2898020cb08c3f36f1
SHA512a572f4a67311a2923462afd70e10a10d2c86f5cd45f1efdea9f660942d8fece61cb3d8cc2e44abac77312e01174edd40efcbd97853e6a39a4e5bb23f36ea3eae