Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 10:14
Behavioral task
behavioral1
Sample
1669a148b1cf49b41786a6a0611562bf.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1669a148b1cf49b41786a6a0611562bf.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
1669a148b1cf49b41786a6a0611562bf.exe
-
Size
9KB
-
MD5
1669a148b1cf49b41786a6a0611562bf
-
SHA1
6e7162063bbadcd6da33a5ec959d7d38dd3da4e3
-
SHA256
e107b3e439f590051d905d6748ee754c2071623494c773eec6959ffcc8b1ba84
-
SHA512
d3e046c6802eabc463f0b1c4eb89d806f9298d6a47587a703cf600c91b3634e80b80fb069a7bd4ed679cc1cedfaeaa62b78098ab396f3d50b286a5ce7b303ea0
-
SSDEEP
192:2tQtE4eAFB1Z0WVUVEmW9RDFaNJhLkwcud2DH9VwGfctIUP:uQCkRUO9JaNJawcudoD7UlP
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2236 b2e.exe -
Loads dropped DLL 2 IoCs
pid Process 1876 1669a148b1cf49b41786a6a0611562bf.exe 1876 1669a148b1cf49b41786a6a0611562bf.exe -
resource yara_rule behavioral1/memory/1876-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1876-13-0x0000000000560000-0x0000000000565000-memory.dmp upx behavioral1/memory/1876-10-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2236 1876 1669a148b1cf49b41786a6a0611562bf.exe 16 PID 1876 wrote to memory of 2236 1876 1669a148b1cf49b41786a6a0611562bf.exe 16 PID 1876 wrote to memory of 2236 1876 1669a148b1cf49b41786a6a0611562bf.exe 16 PID 1876 wrote to memory of 2236 1876 1669a148b1cf49b41786a6a0611562bf.exe 16
Processes
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\954.tmp\batchfile.bat" "1⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\915.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\915.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\915.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\1669a148b1cf49b41786a6a0611562bf.exe"1⤵
- Executes dropped EXE
PID:2236 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\selfdel0.bat" "2⤵PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\1669a148b1cf49b41786a6a0611562bf.exe"C:\Users\Admin\AppData\Local\Temp\1669a148b1cf49b41786a6a0611562bf.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876