Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
2a340e02387459453d889f2e8bfbc96c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a340e02387459453d889f2e8bfbc96c.exe
Resource
win10v2004-20231215-en
General
-
Target
2a340e02387459453d889f2e8bfbc96c.exe
-
Size
212KB
-
MD5
2a340e02387459453d889f2e8bfbc96c
-
SHA1
3d911c9f07b35f7aa9c782e148984740f29b7e6f
-
SHA256
51a2a7cd3b67e62bb47545f746ea8b31fccbbeba453ed727ff8c6ba4b9608506
-
SHA512
d799d907d0b4791858465fc24c98550364f017a6b3c5ded71b273c4a5ceab5f3cfdae9456a667e40e6fbaeb78afcfb79f75f021907d7fef96d91c4c53cc64fd8
-
SSDEEP
6144:slpTBr0JxRt2djT6dRyK+KdYhjnShGkRc:wFOx0jmDd6jShGkR
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3052 u.dll 2188 mpress.exe 2348 u.dll 2724 mpress.exe -
Loads dropped DLL 8 IoCs
pid Process 3008 cmd.exe 3008 cmd.exe 3052 u.dll 3052 u.dll 3008 cmd.exe 3008 cmd.exe 2348 u.dll 2348 u.dll -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 936 wrote to memory of 3008 936 2a340e02387459453d889f2e8bfbc96c.exe 29 PID 936 wrote to memory of 3008 936 2a340e02387459453d889f2e8bfbc96c.exe 29 PID 936 wrote to memory of 3008 936 2a340e02387459453d889f2e8bfbc96c.exe 29 PID 936 wrote to memory of 3008 936 2a340e02387459453d889f2e8bfbc96c.exe 29 PID 3008 wrote to memory of 3052 3008 cmd.exe 30 PID 3008 wrote to memory of 3052 3008 cmd.exe 30 PID 3008 wrote to memory of 3052 3008 cmd.exe 30 PID 3008 wrote to memory of 3052 3008 cmd.exe 30 PID 3052 wrote to memory of 2188 3052 u.dll 31 PID 3052 wrote to memory of 2188 3052 u.dll 31 PID 3052 wrote to memory of 2188 3052 u.dll 31 PID 3052 wrote to memory of 2188 3052 u.dll 31 PID 3008 wrote to memory of 2348 3008 cmd.exe 32 PID 3008 wrote to memory of 2348 3008 cmd.exe 32 PID 3008 wrote to memory of 2348 3008 cmd.exe 32 PID 3008 wrote to memory of 2348 3008 cmd.exe 32 PID 2348 wrote to memory of 2724 2348 u.dll 33 PID 2348 wrote to memory of 2724 2348 u.dll 33 PID 2348 wrote to memory of 2724 2348 u.dll 33 PID 2348 wrote to memory of 2724 2348 u.dll 33 PID 3008 wrote to memory of 2020 3008 cmd.exe 34 PID 3008 wrote to memory of 2020 3008 cmd.exe 34 PID 3008 wrote to memory of 2020 3008 cmd.exe 34 PID 3008 wrote to memory of 2020 3008 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a340e02387459453d889f2e8bfbc96c.exe"C:\Users\Admin\AppData\Local\Temp\2a340e02387459453d889f2e8bfbc96c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\8F93.tmp\vir.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 2a340e02387459453d889f2e8bfbc96c.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\91A5.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\91A5.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe91B6.tmp"4⤵
- Executes dropped EXE
PID:2188
-
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\951E.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\951E.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe952F.tmp"4⤵
- Executes dropped EXE
PID:2724
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵PID:2020
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
763B
MD59487760f28c48bc5dc4713912d67d97a
SHA171f48e61664f4c0624f7904197e5909643ff682c
SHA2562b0fb81763a09ba485f1c9858fb6d3928a4767089c48f6905f6e0108a8c7a4e4
SHA51254ba2dcb3fc85e83d4a7bc7c77afc1721565e614e94a39d4c8f6fa9173517cffbbd1614ae3595f7015b32a7d08fef39a2614fbfe9930e5e1397a701ea5d6e983
-
Filesize
41KB
MD581700f10a09dd9cf35f7f9a656962ccd
SHA13a41b40fa37c2d12d4396850a44c2b715524daac
SHA2566da1c3cdaa0e6f4e6ca85773b8ae7569fc0dfd7dd4dcf0ed4cab5b79e4c3da1b
SHA512a6b88658c264e848b386efdfa144d63cd55514c44ccfe497cf495b98c93f2e44d6852e59f8d2e3763abe56db140820a46ee0050de238a34b064564b3f5b9c73c
-
Filesize
24KB
MD5adb0a7c1c9a8e9d874da3eb2aa7a19a5
SHA19b18273a5e39131e361e3b6fb3f4573a2d244e11
SHA256623dce686afb6e14a73619242d1e5979bd7fd97d4d296ef11290218aacb2c231
SHA5127d77df49b95a7fd7514b153fdf8bb2cc13cc46fccff4d2ec7d53f2f6bad2744bb443ed7e6eb0b2cb6aac6a49fa503e7f3c4726214a56919b0912a62e8ca6fde9
-
Filesize
41KB
MD592fd3829b084c641bd63f33e4ece6124
SHA1d61a9eee023d7d99b8698bdeeabe926c78ef46df
SHA2566ed918b17f4de0944cb2b93abe89f3d787ab4812055a327f455b38ac5685edaa
SHA512f5212597f4104bb60c916c88fd56a60f68b0357b3ed30c216045c3cfabaa63a3b8e02960e52fc7b3e96a84b5320693a895ee8257ad0e99a1c194a331b15066ab
-
Filesize
41KB
MD55185754d880aaf295847d5517075ef01
SHA1d4411da5c2d066f948ad298a7c2f74f15777238c
SHA2566d0327062266295e97d3a9a7408ac09f906d416546934a9f247571d9a544dad2
SHA5129dfcb9dfec260c98a57d5389709da59f39f15630bc31e54fa7b36f126455284b4566658084456f77aa9c6eaa921dfd456d2ab059498b3900f4bd1213080b2180
-
Filesize
25KB
MD5520109b249039314b290e4adb001002c
SHA1eee45f0bc719772748690438305946f2ce0da1be
SHA256648030f2226a407edf1f0a2ef33cbaff3ca1842666f1331f20437110b0cb21d1
SHA51235ad384a2475c5a3110b9995cbcfec3490b0e273fd8d4c9b465ff7c51af9cae417f1365a62cb83622d13fe510476d39dec5652ac7f406f240e010c1fb34825f4
-
Filesize
700KB
MD57b1c37fcd3b5b90fe4dadcd3c44f48b2
SHA1b708c6d7522ea926c238d88acc7a460458b91225
SHA256338b4ed66bc3472d15c3021c9d4f0ce8afb1d19fe864cdb32e4a8deb4070ad5f
SHA512850e9dc09a719631426410826aa55a4461e9a2166d70c214a738b5f704249cfa9e6ed1c510e49ebf0b1d17884f5f49a567c9f7d478893baa2c8934e492cf6dbc
-
Filesize
777B
MD58fa359f94b7d2c57ab070e28bcb18889
SHA1bb5d739493231dbd2273de6a609a067537eccd3f
SHA256ab502a3c856e7f39a1306cd5c6dd54a153b8a99fba7f537d63ce1d6d3927588a
SHA512c07a1978cec19da872ea77e8f01dcb03e21f9d4812a54bdce706590b87f7187af9a7a4f04b9accd4f403f6ebe7ddad4d1286e2823b8d33a668e09b72ca1a138b
-
Filesize
801B
MD55662acc6dfdea457daefedca1d40b076
SHA17f2c0fc05a88cb94d335dab8146d4e4e8d02373d
SHA256826c2c64111afc5cba4059739a9885c7be617adb826b1c43c483df9c7a7b48c4
SHA512214d549cea1c13bf3575ce94e1fe9f360508a5f6b1fcbe03c793b960201d8248617a4662c651998b7f0b78887d40aadb09070f3e92f3f8393fcb3eb872877600
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e