Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15/10/2023, 19:47 UTC
Static task
static1
Behavioral task
behavioral1
Sample
d4241664d57cbee73958005d2d30d510_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d4241664d57cbee73958005d2d30d510_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
d4241664d57cbee73958005d2d30d510_exe32.exe
-
Size
60KB
-
MD5
d4241664d57cbee73958005d2d30d510
-
SHA1
0122431ddf292c8c8d3ec6bc7799f90aeb33f836
-
SHA256
96fef3c78f78f180669bdd741be26e6c0a3acb039e6a4235110fc498ad0804e4
-
SHA512
5cce198150b95fa68f71543837fccfaedee43b3c620fd1f32b797cb7837c88d7499cbecc4a182ad5c0622c4f8d484c957a38fbc2a93c10fd93024c4a4d2d35a3
-
SSDEEP
1536:Itka3G9MXSRa+ycuCRo0oxNqIxSupVvIZ:Qka29MXZxIZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2368 bijaweed.exe -
Loads dropped DLL 1 IoCs
pid Process 2296 d4241664d57cbee73958005d2d30d510_exe32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 icanhazip.com -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2368 2296 d4241664d57cbee73958005d2d30d510_exe32.exe 28 PID 2296 wrote to memory of 2368 2296 d4241664d57cbee73958005d2d30d510_exe32.exe 28 PID 2296 wrote to memory of 2368 2296 d4241664d57cbee73958005d2d30d510_exe32.exe 28 PID 2296 wrote to memory of 2368 2296 d4241664d57cbee73958005d2d30d510_exe32.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4241664d57cbee73958005d2d30d510_exe32.exe"C:\Users\Admin\AppData\Local\Temp\d4241664d57cbee73958005d2d30d510_exe32.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\bijaweed.exeC:\Users\Admin\AppData\Local\Temp\bijaweed.exe2⤵
- Executes dropped EXE
PID:2368
-
Network
-
Remote address:8.8.8.8:53Requesticanhazip.comIN AResponseicanhazip.comIN A104.18.115.97icanhazip.comIN A104.18.114.97
-
Remote address:104.18.115.97:80RequestGET / HTTP/1.1
Accept: text/*, application/*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Firefox/38.0
Host: icanhazip.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Content-Type: text/plain
Content-Length: 13
Connection: keep-alive
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: GET
Set-Cookie: __cf_bm=7IMw0lmi1hT07zOab3ycglmKbi4JK4r_vSOzQGYhh5U-1697417420-0-AYtA3cwxxCYW0Eq2wiyBpD78FuA9fvVtPg/76Lm/2x8hId6VfYW3hBPLxgi0ZIS35n/VpwopTt++SAzQr3wpAbA=; path=/; expires=Mon, 16-Oct-23 01:20:20 GMT; domain=.icanhazip.com; HttpOnly; SameSite=None
Server: cloudflare
CF-RAY: 816c4e9e5cf20e44-AMS
alt-svc: h3=":443"; ma=86400
-
463 B 1.3kB 6 5
HTTP Request
GET http://icanhazip.com/HTTP Response
200 -
104 B 2
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
104 B 2
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD582d96254aa987cb34f5678b31e8f8220
SHA175a6fdf3d68e6d77dec3cf73c7c86ebf1d314b5a
SHA2564f987beceb2dd955e5a4f9981bb4e4c90f78e4d1068acbfe19c3ef4f8d7f6531
SHA5127ed1f35ee61ddb2f4aa1c386e53405ffcc9f5bb8e1bdf1150e13b2edeb5accccdb561740d44f3e3ed2187c5a838d8e58389f17d31271d4aaf0275ba06794a252
-
Filesize
60KB
MD582d96254aa987cb34f5678b31e8f8220
SHA175a6fdf3d68e6d77dec3cf73c7c86ebf1d314b5a
SHA2564f987beceb2dd955e5a4f9981bb4e4c90f78e4d1068acbfe19c3ef4f8d7f6531
SHA5127ed1f35ee61ddb2f4aa1c386e53405ffcc9f5bb8e1bdf1150e13b2edeb5accccdb561740d44f3e3ed2187c5a838d8e58389f17d31271d4aaf0275ba06794a252
-
Filesize
60KB
MD582d96254aa987cb34f5678b31e8f8220
SHA175a6fdf3d68e6d77dec3cf73c7c86ebf1d314b5a
SHA2564f987beceb2dd955e5a4f9981bb4e4c90f78e4d1068acbfe19c3ef4f8d7f6531
SHA5127ed1f35ee61ddb2f4aa1c386e53405ffcc9f5bb8e1bdf1150e13b2edeb5accccdb561740d44f3e3ed2187c5a838d8e58389f17d31271d4aaf0275ba06794a252