Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 08:05
Behavioral task
behavioral1
Sample
10e1016e1493f4fe4d1beaa94b2873d7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10e1016e1493f4fe4d1beaa94b2873d7.exe
Resource
win10v2004-20231215-en
General
-
Target
10e1016e1493f4fe4d1beaa94b2873d7.exe
-
Size
43KB
-
MD5
10e1016e1493f4fe4d1beaa94b2873d7
-
SHA1
28a77d75c6379ad6e33dbc776d0a90ac46d24844
-
SHA256
cf3a974b073a510285cc49223ceb0b23d24b5b29b6562e32ea4540f3c82bf0a7
-
SHA512
66037835663c14d93420bc630b21d5b93a84699fe42cc8cfbc21907610c1305444b3a6c29990b14a006f509ba243fa061219d8a22eae0a8e338355b290de9c28
-
SSDEEP
768:BcL22h+SkmVeJ4zfwcl+oou2C0EStY3CxyLMQH+5JBe033yf:GTLkmXzj3o3CqtY384H+5JBe03if
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 EXPL0RER.EXE -
Loads dropped DLL 2 IoCs
pid Process 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe -
resource yara_rule behavioral1/memory/2624-0-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2624-19-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2744-25-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/files/0x000900000001225e-18.dat upx behavioral1/memory/2744-26-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\EXPL0RER.EXE 10e1016e1493f4fe4d1beaa94b2873d7.exe File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE 10e1016e1493f4fe4d1beaa94b2873d7.exe File created C:\Windows\SysWOW64\SP00LSV.EXE 10e1016e1493f4fe4d1beaa94b2873d7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2744 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 28 PID 2624 wrote to memory of 2744 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 28 PID 2624 wrote to memory of 2744 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 28 PID 2624 wrote to memory of 2744 2624 10e1016e1493f4fe4d1beaa94b2873d7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\10e1016e1493f4fe4d1beaa94b2873d7.exe"C:\Users\Admin\AppData\Local\Temp\10e1016e1493f4fe4d1beaa94b2873d7.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\EXPL0RER.EXE"C:\Windows\system32\EXPL0RER.EXE" "C:\Users\Admin\AppData\Local\Temp\10e1016e1493f4fe4d1beaa94b2873d7.exe"2⤵
- Executes dropped EXE
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD510e1016e1493f4fe4d1beaa94b2873d7
SHA128a77d75c6379ad6e33dbc776d0a90ac46d24844
SHA256cf3a974b073a510285cc49223ceb0b23d24b5b29b6562e32ea4540f3c82bf0a7
SHA51266037835663c14d93420bc630b21d5b93a84699fe42cc8cfbc21907610c1305444b3a6c29990b14a006f509ba243fa061219d8a22eae0a8e338355b290de9c28
-
Filesize
3KB
MD53d66101a0781f9983a50f24098b82b33
SHA197e86b0953b4aed591717c1c5f1013e29807cefa
SHA25624ea4b268b0ab24de1a846b5fc02f5daf476c18fdbf90040d4245d4ec5b986f1
SHA512d64c391a710b0cbaa1e178a6b142580abc66b3cb2b241e1669ce59cb312e5b08216767546e850c0d677551b82f5816fd4ac1d235c0fb0dc88272a7298ef3a6cf