Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:05
Behavioral task
behavioral1
Sample
97aab0a912875f65ae91d3d67e5b4541.exe
Resource
win7-20231215-en
General
-
Target
97aab0a912875f65ae91d3d67e5b4541.exe
-
Size
441KB
-
MD5
97aab0a912875f65ae91d3d67e5b4541
-
SHA1
dff953da77d139e9f7ecd6292d548d1df0cf46cf
-
SHA256
43a6dbabf9d91478c9763b315004b2066d4f8dd539c223a0813cbba409253c96
-
SHA512
23c9033497f6337811e878f24b43a64f6e3065699d60d31b803b93796988ec186ecfe69c699b11da5322efe0e4f8da7cd5c4c198009db8149315f63f47e40714
-
SSDEEP
6144:oo3wBi+1Py3V0a2WkRNgi3caOHO5NjEwwiYWB5mV4Pzw9ygibGGMRJ2:rKf1PyKa2H3hOHOHz9JQ6zBGI
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.165
218.54.31.226
Signatures
-
Deletes itself 1 IoCs
pid Process 1568 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2928 ebdap.exe 2436 coron.exe -
Loads dropped DLL 2 IoCs
pid Process 2992 97aab0a912875f65ae91d3d67e5b4541.exe 2928 ebdap.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe 2436 coron.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2928 2992 97aab0a912875f65ae91d3d67e5b4541.exe 28 PID 2992 wrote to memory of 2928 2992 97aab0a912875f65ae91d3d67e5b4541.exe 28 PID 2992 wrote to memory of 2928 2992 97aab0a912875f65ae91d3d67e5b4541.exe 28 PID 2992 wrote to memory of 2928 2992 97aab0a912875f65ae91d3d67e5b4541.exe 28 PID 2992 wrote to memory of 1568 2992 97aab0a912875f65ae91d3d67e5b4541.exe 29 PID 2992 wrote to memory of 1568 2992 97aab0a912875f65ae91d3d67e5b4541.exe 29 PID 2992 wrote to memory of 1568 2992 97aab0a912875f65ae91d3d67e5b4541.exe 29 PID 2992 wrote to memory of 1568 2992 97aab0a912875f65ae91d3d67e5b4541.exe 29 PID 2928 wrote to memory of 2436 2928 ebdap.exe 33 PID 2928 wrote to memory of 2436 2928 ebdap.exe 33 PID 2928 wrote to memory of 2436 2928 ebdap.exe 33 PID 2928 wrote to memory of 2436 2928 ebdap.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\97aab0a912875f65ae91d3d67e5b4541.exe"C:\Users\Admin\AppData\Local\Temp\97aab0a912875f65ae91d3d67e5b4541.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\ebdap.exe"C:\Users\Admin\AppData\Local\Temp\ebdap.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\coron.exe"C:\Users\Admin\AppData\Local\Temp\coron.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD5c162196d272eab5db2945ec942a7b4e2
SHA116d11ddc66f802728d038737c937b76012f80399
SHA256a82f0f80b474198dc2df109cf253f3c7fa5d2c3048897eb80a5acf56629058fc
SHA512fb2edfed35fe95cadc67e60348c70ff569d02b7822a22deb44b71016d3891a3b0530976ad963958a1ffb52e3e46ff13aa43b114ce10df28475106e4601e8df64
-
Filesize
512B
MD53cf17e82063dc29fc1c36ab4cecb3ef8
SHA14d4ddbc0fee563e57d628d89d5b1c7aa38507ce6
SHA25650607138cf82e18b2c1f3a272a3828dd143e6dcbd1275c2da0914becccb0201a
SHA5128b4c9703dc6dddb6b461bcdf7e852aacd5972202e3bceda44340b393d024c596bf1efc021d8234e69d37aaaa62fa951a511b3b05d3c9b0ed13fe0979c8cb07db
-
Filesize
230KB
MD557dc73312222d08651864c63b50db71f
SHA1f05c37fef3c371afc944fa69b0c8ecee6b58fe54
SHA256ccfc3f9eb8c28022b128ef320480ce8db65f5f8a2073b2abbed0b0bc35165375
SHA5126daaa1c0a2022dd84f220696a87630d6232f260421c6708e45e7239f41dab91bb92bc94492b44426f0f78dd76a2b5b3b9496c2796adf149bc5188f74db8e396c
-
Filesize
441KB
MD58fffeb4ff37773249dfd76e3b38c631c
SHA173b28977a19d456b6e2ea5eac81d7a3501e1354d
SHA25640616656647bb8381db1d7ff0aa8205359f38731e96bae52b67b01b28e362dfb
SHA512f115afdbc0eb02f5044fc6524749a61c914c62560af63fd64579a98b3a684caf24685c52168a664505bc973e164c49358bf2ccd0f3dfc506b3081847fa8f044d