Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16/07/2023, 09:21
Static task
static1
Behavioral task
behavioral1
Sample
5e72183d7a39d2_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5e72183d7a39d2_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
5e72183d7a39d2_JC.exe
-
Size
373KB
-
MD5
5e72183d7a39d29d18fa6698c93ba263
-
SHA1
8f8792d9fa945dfaaa4ed47776cbeadc76c5cf54
-
SHA256
c7b197b0091ed6fc1dacb6af17f043a074e73653978c152f11e1ffc12cafd425
-
SHA512
1e06d321f3cd1bd8ee71b0b94429f21f70224dc4009989d7414054c4207ece8c67fb4a332f38835ca605145cf6d62d8408d7d820410a24169a30acb46399307d
-
SSDEEP
6144:CplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:CplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2188 provides.exe -
Loads dropped DLL 2 IoCs
pid Process 1152 5e72183d7a39d2_JC.exe 1152 5e72183d7a39d2_JC.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\withthe\provides.exe 5e72183d7a39d2_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1152 5e72183d7a39d2_JC.exe 1152 5e72183d7a39d2_JC.exe 1152 5e72183d7a39d2_JC.exe 1152 5e72183d7a39d2_JC.exe 2188 provides.exe 2188 provides.exe 2188 provides.exe 2188 provides.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2188 1152 5e72183d7a39d2_JC.exe 28 PID 1152 wrote to memory of 2188 1152 5e72183d7a39d2_JC.exe 28 PID 1152 wrote to memory of 2188 1152 5e72183d7a39d2_JC.exe 28 PID 1152 wrote to memory of 2188 1152 5e72183d7a39d2_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e72183d7a39d2_JC.exe"C:\Users\Admin\AppData\Local\Temp\5e72183d7a39d2_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files\withthe\provides.exe"C:\Program Files\withthe\provides.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373KB
MD555ebccae241bdab9a54af73f2d5d9db8
SHA1f3d1dbe3b40c4a13a9c76a1cbe7cffd8dc2859d7
SHA256e7843bb6ebd7be067d9056bccc0c0ee62c827ec25cb5e990e988c29e7ed8d7ba
SHA512790aa8effb6f2372943c99fbeaea2c1b39e74ccefb04d6f41106e1048ea3794b9e7e381029ce0235a2f535a697ad1e0dafc00547d996c59a44a0e890e8cd56bb
-
Filesize
373KB
MD555ebccae241bdab9a54af73f2d5d9db8
SHA1f3d1dbe3b40c4a13a9c76a1cbe7cffd8dc2859d7
SHA256e7843bb6ebd7be067d9056bccc0c0ee62c827ec25cb5e990e988c29e7ed8d7ba
SHA512790aa8effb6f2372943c99fbeaea2c1b39e74ccefb04d6f41106e1048ea3794b9e7e381029ce0235a2f535a697ad1e0dafc00547d996c59a44a0e890e8cd56bb
-
Filesize
373KB
MD555ebccae241bdab9a54af73f2d5d9db8
SHA1f3d1dbe3b40c4a13a9c76a1cbe7cffd8dc2859d7
SHA256e7843bb6ebd7be067d9056bccc0c0ee62c827ec25cb5e990e988c29e7ed8d7ba
SHA512790aa8effb6f2372943c99fbeaea2c1b39e74ccefb04d6f41106e1048ea3794b9e7e381029ce0235a2f535a697ad1e0dafc00547d996c59a44a0e890e8cd56bb
-
Filesize
373KB
MD555ebccae241bdab9a54af73f2d5d9db8
SHA1f3d1dbe3b40c4a13a9c76a1cbe7cffd8dc2859d7
SHA256e7843bb6ebd7be067d9056bccc0c0ee62c827ec25cb5e990e988c29e7ed8d7ba
SHA512790aa8effb6f2372943c99fbeaea2c1b39e74ccefb04d6f41106e1048ea3794b9e7e381029ce0235a2f535a697ad1e0dafc00547d996c59a44a0e890e8cd56bb