Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18/07/2023, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
caa2689cbee3de_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
caa2689cbee3de_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
caa2689cbee3de_JC.exe
-
Size
271KB
-
MD5
caa2689cbee3de4baf0ffd293b03c991
-
SHA1
36ead8f72b664ec06be49cde171513300bc27b04
-
SHA256
69a5540e362cf09eb0684db266b4ae4c979c5bd83f239fa3607a7b5de1216ca6
-
SHA512
5ee7d6b8e5005272a9392c9afcc14c4b45c912da90a31ae67d8146b6cbb1c40a723487845e0b2f8e5e5b0fd05d683c4949da36b55b3c0c6d50e341e57ee7c13d
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2012 topics.exe -
Loads dropped DLL 2 IoCs
pid Process 2560 caa2689cbee3de_JC.exe 2560 caa2689cbee3de_JC.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Security\topics.exe caa2689cbee3de_JC.exe File opened for modification C:\Program Files\Security\topics.exe caa2689cbee3de_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2560 caa2689cbee3de_JC.exe 2560 caa2689cbee3de_JC.exe 2560 caa2689cbee3de_JC.exe 2560 caa2689cbee3de_JC.exe 2012 topics.exe 2012 topics.exe 2012 topics.exe 2012 topics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2012 2560 caa2689cbee3de_JC.exe 28 PID 2560 wrote to memory of 2012 2560 caa2689cbee3de_JC.exe 28 PID 2560 wrote to memory of 2012 2560 caa2689cbee3de_JC.exe 28 PID 2560 wrote to memory of 2012 2560 caa2689cbee3de_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\caa2689cbee3de_JC.exe"C:\Users\Admin\AppData\Local\Temp\caa2689cbee3de_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files\Security\topics.exe"C:\Program Files\Security\topics.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD5694094defa0f8fcb252e6d209bd37627
SHA115342ae6fd9d53598053e2259ed2f27ecd93d591
SHA2565774a1dd5dd0140a71bc12b20e158ee7f5964e3ed6ea7543380f8cfbc50a7241
SHA512cdb2cfda51ddc07fc3de5a7162a83d1169d524db0a1ccb38e9ac1fb656bd6ca68e6ebdec06f54948c30dfe9b7b311d90f7dec8ead361caa2c7aef69101c375cb
-
Filesize
271KB
MD5694094defa0f8fcb252e6d209bd37627
SHA115342ae6fd9d53598053e2259ed2f27ecd93d591
SHA2565774a1dd5dd0140a71bc12b20e158ee7f5964e3ed6ea7543380f8cfbc50a7241
SHA512cdb2cfda51ddc07fc3de5a7162a83d1169d524db0a1ccb38e9ac1fb656bd6ca68e6ebdec06f54948c30dfe9b7b311d90f7dec8ead361caa2c7aef69101c375cb
-
Filesize
271KB
MD5694094defa0f8fcb252e6d209bd37627
SHA115342ae6fd9d53598053e2259ed2f27ecd93d591
SHA2565774a1dd5dd0140a71bc12b20e158ee7f5964e3ed6ea7543380f8cfbc50a7241
SHA512cdb2cfda51ddc07fc3de5a7162a83d1169d524db0a1ccb38e9ac1fb656bd6ca68e6ebdec06f54948c30dfe9b7b311d90f7dec8ead361caa2c7aef69101c375cb
-
Filesize
271KB
MD5694094defa0f8fcb252e6d209bd37627
SHA115342ae6fd9d53598053e2259ed2f27ecd93d591
SHA2565774a1dd5dd0140a71bc12b20e158ee7f5964e3ed6ea7543380f8cfbc50a7241
SHA512cdb2cfda51ddc07fc3de5a7162a83d1169d524db0a1ccb38e9ac1fb656bd6ca68e6ebdec06f54948c30dfe9b7b311d90f7dec8ead361caa2c7aef69101c375cb