Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16/07/2023, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
64f5f59d74d5a6_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
64f5f59d74d5a6_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
64f5f59d74d5a6_JC.exe
-
Size
143KB
-
MD5
64f5f59d74d5a682512b118247d80f22
-
SHA1
9978e209357cb22c894b1d802f67c36b2fb6b4c5
-
SHA256
d7fdba133b067b76ebc0246900499aa658a29c14f7a5f3c6ab7acb4540e9b460
-
SHA512
96a9787caa8fdea24ac4d5987811c8c01810579709138fcfcf16200c080b5a9f63ddbf7da1a46f7bfe2a8aa1881b04e9102e32ed24232bce58fa5cac599c8cfd
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbxGYQbxGYQbPlooN4T:V6a+pOtEvwDpjt222
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2516 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2800 64f5f59d74d5a6_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2516 2800 64f5f59d74d5a6_JC.exe 28 PID 2800 wrote to memory of 2516 2800 64f5f59d74d5a6_JC.exe 28 PID 2800 wrote to memory of 2516 2800 64f5f59d74d5a6_JC.exe 28 PID 2800 wrote to memory of 2516 2800 64f5f59d74d5a6_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\64f5f59d74d5a6_JC.exe"C:\Users\Admin\AppData\Local\Temp\64f5f59d74d5a6_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2516
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143KB
MD5a997f8b331975aca74eb5aa56afbfd59
SHA13fceb1bbc9c6e1f069800f415e94ef0c00c5f86e
SHA25646f0ad96d7baf2abdec801766e8b60db57ae274e788734fccffbde7e73927c70
SHA5128cf65ea532409f791ab1608821e98e5c0723ea36e64e2a2e9c6467ee56ff86039c9d1dacf91fb2f0c7a0a59096513447e6744d6fb4edbd86c4a0b112474a2256
-
Filesize
143KB
MD5a997f8b331975aca74eb5aa56afbfd59
SHA13fceb1bbc9c6e1f069800f415e94ef0c00c5f86e
SHA25646f0ad96d7baf2abdec801766e8b60db57ae274e788734fccffbde7e73927c70
SHA5128cf65ea532409f791ab1608821e98e5c0723ea36e64e2a2e9c6467ee56ff86039c9d1dacf91fb2f0c7a0a59096513447e6744d6fb4edbd86c4a0b112474a2256
-
Filesize
143KB
MD5a997f8b331975aca74eb5aa56afbfd59
SHA13fceb1bbc9c6e1f069800f415e94ef0c00c5f86e
SHA25646f0ad96d7baf2abdec801766e8b60db57ae274e788734fccffbde7e73927c70
SHA5128cf65ea532409f791ab1608821e98e5c0723ea36e64e2a2e9c6467ee56ff86039c9d1dacf91fb2f0c7a0a59096513447e6744d6fb4edbd86c4a0b112474a2256