Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
178s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 05:12
Static task
static1
Behavioral task
behavioral1
Sample
0717a1e0830d6cf2dfc43dde026f4dbc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0717a1e0830d6cf2dfc43dde026f4dbc.exe
Resource
win10v2004-20231215-en
General
-
Target
0717a1e0830d6cf2dfc43dde026f4dbc.exe
-
Size
1.5MB
-
MD5
0717a1e0830d6cf2dfc43dde026f4dbc
-
SHA1
1c54da793cc454a363756a5f4ef9c82dfdeddb27
-
SHA256
dbabf0ad9f6b527b362ddcc01abb3b59ea799c2d33ce0db03c28d083178b7636
-
SHA512
0f7188019345075edc6ca87d915960b04c5a4fe4230a746b5861ce885c19b3d52c026bb9f0ef3d4e3dc9ce6b2d619ba641f448384d7259579e262171db97eae7
-
SSDEEP
24576:k20ojqb/MXJb0f06cUQnbPL8RjpJAAok0lAqnaARFE7SghZ+3MumS/Dt:k235b0NTQnX8RdJAAoknqrzSSgL+3nm0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2728 0717a1e0830d6cf2dfc43dde026f4dbc.tmp -
Loads dropped DLL 3 IoCs
pid Process 1952 0717a1e0830d6cf2dfc43dde026f4dbc.exe 2728 0717a1e0830d6cf2dfc43dde026f4dbc.tmp 2728 0717a1e0830d6cf2dfc43dde026f4dbc.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2728 0717a1e0830d6cf2dfc43dde026f4dbc.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2728 1952 0717a1e0830d6cf2dfc43dde026f4dbc.exe 28 PID 1952 wrote to memory of 2728 1952 0717a1e0830d6cf2dfc43dde026f4dbc.exe 28 PID 1952 wrote to memory of 2728 1952 0717a1e0830d6cf2dfc43dde026f4dbc.exe 28 PID 1952 wrote to memory of 2728 1952 0717a1e0830d6cf2dfc43dde026f4dbc.exe 28 PID 1952 wrote to memory of 2728 1952 0717a1e0830d6cf2dfc43dde026f4dbc.exe 28 PID 1952 wrote to memory of 2728 1952 0717a1e0830d6cf2dfc43dde026f4dbc.exe 28 PID 1952 wrote to memory of 2728 1952 0717a1e0830d6cf2dfc43dde026f4dbc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0717a1e0830d6cf2dfc43dde026f4dbc.exe"C:\Users\Admin\AppData\Local\Temp\0717a1e0830d6cf2dfc43dde026f4dbc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\is-JQDMD.tmp\0717a1e0830d6cf2dfc43dde026f4dbc.tmp"C:\Users\Admin\AppData\Local\Temp\is-JQDMD.tmp\0717a1e0830d6cf2dfc43dde026f4dbc.tmp" /SL5="$4017E,1292609,64512,C:\Users\Admin\AppData\Local\Temp\0717a1e0830d6cf2dfc43dde026f4dbc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
693KB
MD527417992c47164af5afc1db12356c787
SHA1898de5d391a58f60f5d511c671ab48d30e1e4b0d
SHA2565a0c3196783dd583863a9261c60a1434a923f2860270d100e4fb0c4770282a69
SHA512b492c7b5a0106c8f81a876d642d911de9c3f4779513ff3d31c71dc1aaa53fc23abe8de6220e9825755831a1950a9c06b1dd35709ca03070c8aa6aaff41c3e9ed