Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
aa65cfc2688aed643300bfe43ed882c8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
aa65cfc2688aed643300bfe43ed882c8.exe
Resource
win10v2004-20231215-en
General
-
Target
aa65cfc2688aed643300bfe43ed882c8.exe
-
Size
7.0MB
-
MD5
aa65cfc2688aed643300bfe43ed882c8
-
SHA1
9c5dab09ea411b17c485cfd77d5fb1677f562103
-
SHA256
8e5e0fec5acb44fdc4c3755f8848fc44979902ba37b2e272c71ad8c755e08caa
-
SHA512
b0198bc12ec102368d1c210207b2963aa0179adf55a19eb418d15d607de59ae045b26f776a9929c99406a543bae95ff101c3b0ae874cddd2fbddfb606590dfaf
-
SSDEEP
98304:bOJICXX3T5fkbnTH3M/YDdTaVBB8QLIN0d6/yaZ0Z5oBGWl1St+PGgSeCe1wpN7x:biubn15TCgG6/yq0WdwQg21itxfnCc
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ApplicationFrameHost.exe aa65cfc2688aed643300bfe43ed882c8.exe -
Executes dropped EXE 3 IoCs
pid Process 2156 Eagle.Proxy.Scraper.exe 2804 ApplicationFrameHost.exe 2536 Eagle.Proxy.Scraper.exe -
Loads dropped DLL 4 IoCs
pid Process 2668 aa65cfc2688aed643300bfe43ed882c8.exe 2668 aa65cfc2688aed643300bfe43ed882c8.exe 2156 Eagle.Proxy.Scraper.exe 2536 Eagle.Proxy.Scraper.exe -
resource yara_rule behavioral1/files/0x000600000001755b-44.dat upx behavioral1/files/0x000600000001755b-45.dat upx behavioral1/memory/2536-46-0x000007FEF5C10000-0x000007FEF6097000-memory.dmp upx -
Detects Pyinstaller 5 IoCs
resource yara_rule behavioral1/files/0x0034000000015dc1-7.dat pyinstaller behavioral1/files/0x0034000000015dc1-5.dat pyinstaller behavioral1/files/0x0034000000015dc1-43.dat pyinstaller behavioral1/files/0x0034000000015dc1-42.dat pyinstaller behavioral1/files/0x0034000000015dc1-9.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2804 ApplicationFrameHost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2156 2668 aa65cfc2688aed643300bfe43ed882c8.exe 28 PID 2668 wrote to memory of 2156 2668 aa65cfc2688aed643300bfe43ed882c8.exe 28 PID 2668 wrote to memory of 2156 2668 aa65cfc2688aed643300bfe43ed882c8.exe 28 PID 2668 wrote to memory of 2156 2668 aa65cfc2688aed643300bfe43ed882c8.exe 28 PID 2668 wrote to memory of 2804 2668 aa65cfc2688aed643300bfe43ed882c8.exe 30 PID 2668 wrote to memory of 2804 2668 aa65cfc2688aed643300bfe43ed882c8.exe 30 PID 2668 wrote to memory of 2804 2668 aa65cfc2688aed643300bfe43ed882c8.exe 30 PID 2668 wrote to memory of 2804 2668 aa65cfc2688aed643300bfe43ed882c8.exe 30 PID 2156 wrote to memory of 2536 2156 Eagle.Proxy.Scraper.exe 29 PID 2156 wrote to memory of 2536 2156 Eagle.Proxy.Scraper.exe 29 PID 2156 wrote to memory of 2536 2156 Eagle.Proxy.Scraper.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa65cfc2688aed643300bfe43ed882c8.exe"C:\Users\Admin\AppData\Local\Temp\aa65cfc2688aed643300bfe43ed882c8.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Eagle.Proxy.Scraper.exe\Eagle.Proxy.Scraper.exe"C:\Eagle.Proxy.Scraper.exe\Eagle.Proxy.Scraper.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Eagle.Proxy.Scraper.exe\Eagle.Proxy.Scraper.exe"C:\Eagle.Proxy.Scraper.exe\Eagle.Proxy.Scraper.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2536
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ApplicationFrameHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ApplicationFrameHost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
833KB
MD59a4206a8694f96551af4cb82c22ed9a6
SHA1fc7104b40c5901e9a4f7ab53d94a157dfcb371df
SHA256f6311b7aeec56f5794bace097697f61ec92d540780127816a79e353b49c39cd7
SHA512c1cfb533968b5c521deb230a9597d843bf6817f64d299a9ecd560c877dd5962b7792c4dcef9fbc69e414d9452c4b2e0e2d64de981ef72d4168bbc9515472ad6d
-
Filesize
133KB
MD5078e0a558721bfa79a48eaffc1db91fb
SHA1ef5a3c461f52fd2c648a7d703451141d965ecbee
SHA25653b288859b8c374c724d2ff986e2b9a9da713ec3ff9fdc308bdc9cc7e9ab704f
SHA512adeecb0ef4e7a111c62b5b084c660528d85bfaf3e92dc3915763ad13c6a9bcfc08bcee28a92aa5b7e2880340e3d48ae28f0896675035c45549eabee230de7e78
-
Filesize
817KB
MD58ee5b113a0b14cbfb751b19e9dfde293
SHA15e99e29da9004df862dc64710cd7ef0be982a887
SHA25603d44731e6011981c4bd5d95463b366be19b33dbdbf2e4b811c746456306831f
SHA512f7bb05b3d7776eacefedb0c0dd0ccf5f3a730a15c7e93909ce6e97de2709ca50db3b309eed79c89f393f5d1e0af3fe12ca4b38f0a94cab4e4821bca713309e1d
-
Filesize
626KB
MD56ef412051e553433ed6f65fc0628b435
SHA15825cac53dd650d3bbc343e60d790a02fa44693b
SHA256e586b4ed28f377c4ce59c68e847c4a66aa5aa5ee8e507278e9e747a27023fef9
SHA5126e292a01993bb03e8bd9da1709a904cc6a0e211cc904d42e8327364a5bf0d6178896bd49eb0d100041d49ff0c6b09484e96dfab1334662dd93347795efc76c06
-
Filesize
440KB
MD569946f207417224564920dc7629a3ccf
SHA1bcecc70c7e3046bde9dff9441e16d1ea7809cfac
SHA2562a52adc1aeaf60bca5f4f379214663bb08d0a6f241c516d27e1b13edd79a5011
SHA512170b4da0310fc4e2c2ea2bc6881ac47117c809b200885495dc65b0a6296d6e0ae7abc0b884a28a7bc259c30250557d42e2bbaed8e5916187ad379d9b4a46581f
-
Filesize
64KB
MD544aefaa852ae96cca16a1ec1506c780e
SHA18553d7b4bc9bd76bca69acdecbe82043c52627eb
SHA2565129200cfa8586a173a2b22eebcf21c05e6e6d63ad121a75484c339a9aba1f3b
SHA51222f9a6594d2475382f25ed71bfad78fc10b14b4a1249f9bba043d6e74fba8dc69bcb823f0958fe54fc9baa8f4f68e468582e755c0681a15ccee34a9a418df1c1
-
Filesize
647KB
MD5ecb38ff7c63ea5286846f2ab41de9b2d
SHA1149f27ddcd823eb7655d1b9bbc9ffc0f7d07580d
SHA256c6d6c68db0d1ef67c6b11ebc97ee472cf60b83a548e9ae8cd7af99a5f87e6c5f
SHA512e71ea9f20b1181c5d3ea8cda8e3842bcd725aaad2274c4cb19ddfea5cfe762bc4c22f1fe1cd68f0cd5c7e7aa818a5aaa8e8e31724664560c45c8925c1f1b0d09
-
Filesize
53KB
MD5574296ff0f8368f078343a66be300c12
SHA177afc0f26fd852163f716ba18023169f6044ae6a
SHA25661e3dd8fe365f9159e57d6c66fc20e1040e229039bdd69d749361c1850961275
SHA512a6d1d741302c4a03e397c1fff32a3926aa44ee09afc15496e008b54f88a2b075299b744832c93d9dedf8c639439118f3e40e49ec1280a7478a3a943b4c3b1636