Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
39553eabebbc71a0c880a5341cded7ba.exe
Resource
win7-20231215-en
General
-
Target
39553eabebbc71a0c880a5341cded7ba.exe
-
Size
877KB
-
MD5
39553eabebbc71a0c880a5341cded7ba
-
SHA1
a6b80b531457254e6ee2311face4f089c6ae9071
-
SHA256
22100ac14cae92e48720ac6fe370bd124436f8596e7bb4ad8047967215953601
-
SHA512
e579530d47a1b7409427278385fa03ba989afa26a95c54c3380a4cd8322d0c6398cd0de179704b136edecdf0c12be161c29cdb7ccb64d84c1944ed82d0ea5744
-
SSDEEP
24576:bsMLKmtvPyHu70twEMsKo0nry9pNg4W7HM84cN+2QHCnZ:QiKmHyOgtC/p7s8FQ4
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2428 39553eabebbc71a0c880a5341cded7ba.exe 2428 39553eabebbc71a0c880a5341cded7ba.exe 2428 39553eabebbc71a0c880a5341cded7ba.exe 2428 39553eabebbc71a0c880a5341cded7ba.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 39553eabebbc71a0c880a5341cded7ba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2080 2120 39553eabebbc71a0c880a5341cded7ba.exe 28 PID 2120 wrote to memory of 2080 2120 39553eabebbc71a0c880a5341cded7ba.exe 28 PID 2120 wrote to memory of 2080 2120 39553eabebbc71a0c880a5341cded7ba.exe 28 PID 2120 wrote to memory of 2080 2120 39553eabebbc71a0c880a5341cded7ba.exe 28 PID 2120 wrote to memory of 2080 2120 39553eabebbc71a0c880a5341cded7ba.exe 28 PID 2120 wrote to memory of 2080 2120 39553eabebbc71a0c880a5341cded7ba.exe 28 PID 2120 wrote to memory of 2080 2120 39553eabebbc71a0c880a5341cded7ba.exe 28 PID 2080 wrote to memory of 2428 2080 39553eabebbc71a0c880a5341cded7ba.exe 29 PID 2080 wrote to memory of 2428 2080 39553eabebbc71a0c880a5341cded7ba.exe 29 PID 2080 wrote to memory of 2428 2080 39553eabebbc71a0c880a5341cded7ba.exe 29 PID 2080 wrote to memory of 2428 2080 39553eabebbc71a0c880a5341cded7ba.exe 29 PID 2080 wrote to memory of 2428 2080 39553eabebbc71a0c880a5341cded7ba.exe 29 PID 2080 wrote to memory of 2428 2080 39553eabebbc71a0c880a5341cded7ba.exe 29 PID 2080 wrote to memory of 2428 2080 39553eabebbc71a0c880a5341cded7ba.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\39553eabebbc71a0c880a5341cded7ba.exe"C:\Users\Admin\AppData\Local\Temp\39553eabebbc71a0c880a5341cded7ba.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\39553eabebbc71a0c880a5341cded7ba.exe"C:\Users\Admin\AppData\Local\Temp\39553eabebbc71a0c880a5341cded7ba.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\39553eabebbc71a0c880a5341cded7ba.exe"C:\Users\Admin\AppData\Local\Temp\39553eabebbc71a0c880a5341cded7ba.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2428
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD51dea784ff1b4169d5aa54aab380c6c50
SHA19a3623aa322e54b2eff103aa9d02c727b6e193b6
SHA25683c97f66f438b47646b81387e66c6a83d2aaa33df8305a742bdd82a8cc847f5f
SHA512d250edb737411ff1317d34226bb650c76ae3496996a8e620c65d8f774fdb085c9acf6ed2399c56150dff11bac2186112c757fefd265b6ac482b497e032b92521
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
448KB
MD5d4118b690d2e02b74f05b0864c7b175e
SHA184e413433e84f92e4a2f9c49eaf2afa36bbe06df
SHA256d4139ab5c4877e471b4f6134ae3dabd1acd841c451d083a5567a1b062736105f
SHA5128ce1d73bd8128e5f620ca5521043dc16d8e941498f36d686b8fa0befea66aac2cb6d4bde947af8e84566226d10d7055be2a648f381a5fc5f61479f97e632545e
-
Filesize
35KB
MD5fbb621f940c75da998f3ea1acfc4fcbc
SHA196ea7c032b056b872dfee3352b23f430b1a77141
SHA256d1523e11129d80847d85b8661d4de28495b7095a3049288efa62865891e1038d
SHA51272d7f90709fbb9c8d8c8b10f92cfc22de405e07ccd39b19eb6d986adf4a18dc06c7def8cfef2ac7d2a2629e385f3567f5164aca6c1f83af31d0d51c6ca6c2104