Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/07/2023, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
f4a12f31ce3707exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f4a12f31ce3707exe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
f4a12f31ce3707exe_JC.exe
-
Size
75KB
-
MD5
f4a12f31ce37074427b697106f0f23db
-
SHA1
3bd599e775ea5c5dda8d86b57055bd8c630a7a31
-
SHA256
7dd4c2054efad8a558ff71c8e61514b668bfead69270bfce9169ad13e04d6529
-
SHA512
ff3a84ae0bb1084c689bcd5b00b9c5651c6e5bfc10d211fe2b64409fc611fd3b92c9945daf2e6014b02803229fbc8998046b1f7b688b4481783ab04203f3a16d
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfVtl:vCjsIOtEvwDpj5H9YvQd2d
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2540 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1972 f4a12f31ce3707exe_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2540 1972 f4a12f31ce3707exe_JC.exe 28 PID 1972 wrote to memory of 2540 1972 f4a12f31ce3707exe_JC.exe 28 PID 1972 wrote to memory of 2540 1972 f4a12f31ce3707exe_JC.exe 28 PID 1972 wrote to memory of 2540 1972 f4a12f31ce3707exe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4a12f31ce3707exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\f4a12f31ce3707exe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2540
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD52bd760e02957c470425250795230da3a
SHA1f8ff8bba3590a96df3e3d326f565925f1e5d3705
SHA2569622d9406091e10b53b9aedac3017dc9514d9b1d9ddd58fcf3da7b087ad01342
SHA5122c9da22293731434a8af968136f1a132d4537a2195fddb0698bf18c3322b8be57fea0a15346fb4afcaf259470a55aea05ddb3b5120fab7b11e72ec986460447e
-
Filesize
75KB
MD52bd760e02957c470425250795230da3a
SHA1f8ff8bba3590a96df3e3d326f565925f1e5d3705
SHA2569622d9406091e10b53b9aedac3017dc9514d9b1d9ddd58fcf3da7b087ad01342
SHA5122c9da22293731434a8af968136f1a132d4537a2195fddb0698bf18c3322b8be57fea0a15346fb4afcaf259470a55aea05ddb3b5120fab7b11e72ec986460447e
-
Filesize
75KB
MD52bd760e02957c470425250795230da3a
SHA1f8ff8bba3590a96df3e3d326f565925f1e5d3705
SHA2569622d9406091e10b53b9aedac3017dc9514d9b1d9ddd58fcf3da7b087ad01342
SHA5122c9da22293731434a8af968136f1a132d4537a2195fddb0698bf18c3322b8be57fea0a15346fb4afcaf259470a55aea05ddb3b5120fab7b11e72ec986460447e