Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
100229b0ed26...57.exe
windows7-x64
100229b0ed26...57.exe
windows10-2004-x64
10048b7d1176...04.exe
windows7-x64
10048b7d1176...04.exe
windows10-2004-x64
100f9f03bf48...ae.exe
windows7-x64
100f9f03bf48...ae.exe
windows10-2004-x64
1013047f8cb7...6b.exe
windows7-x64
113047f8cb7...6b.exe
windows10-2004-x64
113c6577c68...d4.exe
windows7-x64
713c6577c68...d4.exe
windows10-2004-x64
7Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/10/2023, 05:39
Behavioral task
behavioral1
Sample
0229b0ed2674e64d663aadcd2d289315b73b14b43b35101ff4fd69456b7c5557.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0229b0ed2674e64d663aadcd2d289315b73b14b43b35101ff4fd69456b7c5557.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
048b7d11768267d538ae8066805e65a387d52c90ecfd929f695866120e853904.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
048b7d11768267d538ae8066805e65a387d52c90ecfd929f695866120e853904.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
0f9f03bf486e3823a6ad596d4c1bd707fe19031acc0d17a3138409c8f3ee89ae.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
0f9f03bf486e3823a6ad596d4c1bd707fe19031acc0d17a3138409c8f3ee89ae.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
13047f8cb7277ad8c1daa6f32cf4ae8029fb6ae9f839ed92d4cae12285ed366b.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
13047f8cb7277ad8c1daa6f32cf4ae8029fb6ae9f839ed92d4cae12285ed366b.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe
Resource
win10v2004-20230915-en
General
-
Target
13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe
-
Size
347KB
-
MD5
960f9112b687fc805cc7d6483ec60a14
-
SHA1
a4f965d227bdc79f49e09172f27e4e647e065a05
-
SHA256
13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4
-
SHA512
a1b8ef63d87f6a41627258297ab8da91e4d7efafb83220d03ce8046c7142c641f14e118483652a830b44c441af4eba668352860eae51994efff9fed84c13de57
-
SSDEEP
6144:5kO+mGx363FXS+3oYU9IML4ChRJX6Tf1AR+O+v0NaRH:5pcRkFih9IMkC9qxr0NC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2312 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2744 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2744 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2312 1856 13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe 29 PID 1856 wrote to memory of 2312 1856 13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe 29 PID 1856 wrote to memory of 2312 1856 13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe 29 PID 1856 wrote to memory of 2312 1856 13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe 29 PID 2312 wrote to memory of 2744 2312 cmd.exe 31 PID 2312 wrote to memory of 2744 2312 cmd.exe 31 PID 2312 wrote to memory of 2744 2312 cmd.exe 31 PID 2312 wrote to memory of 2744 2312 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe"C:\Users\Admin\AppData\Local\Temp\13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-