Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 07:05
Static task
static1
Behavioral task
behavioral1
Sample
5b648b9054475b8496b7fe3e3d562f5a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b648b9054475b8496b7fe3e3d562f5a.exe
Resource
win10v2004-20231222-en
General
-
Target
5b648b9054475b8496b7fe3e3d562f5a.exe
-
Size
142KB
-
MD5
5b648b9054475b8496b7fe3e3d562f5a
-
SHA1
ce7321839540299a9c894bf1338ab6592aff9c4e
-
SHA256
6da1bb18d50b9365e9b290dc2be93ec280a7b76a121023e4e453f400a3235ffe
-
SHA512
8e14785c90ffc6c8837865f317852e04117ed5fb45c15c6e61bfd2c98a35d8f189c6f0fcb88bbaf13ba73417ac38e6142269f61dfa39bbb3c53a7842766bfcdf
-
SSDEEP
3072:inOn7t7XpdpCCTg/sxFgJaeqgKJ+BCpC0BOAIiBMwLi70QNe+rH8R70AxpSQ8:iKpdcCrTdgK4nlidu4YVHo7mQ8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2696 downloadmr.exe -
Loads dropped DLL 4 IoCs
pid Process 3000 5b648b9054475b8496b7fe3e3d562f5a.exe 3000 5b648b9054475b8496b7fe3e3d562f5a.exe 3000 5b648b9054475b8496b7fe3e3d562f5a.exe 3000 5b648b9054475b8496b7fe3e3d562f5a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2696 downloadmr.exe 2696 downloadmr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2696 3000 5b648b9054475b8496b7fe3e3d562f5a.exe 17 PID 3000 wrote to memory of 2696 3000 5b648b9054475b8496b7fe3e3d562f5a.exe 17 PID 3000 wrote to memory of 2696 3000 5b648b9054475b8496b7fe3e3d562f5a.exe 17 PID 3000 wrote to memory of 2696 3000 5b648b9054475b8496b7fe3e3d562f5a.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b648b9054475b8496b7fe3e3d562f5a.exe"C:\Users\Admin\AppData\Local\Temp\5b648b9054475b8496b7fe3e3d562f5a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\nsd1E6B.tmp\downloadmr.exeC:\Users\Admin\AppData\Local\Temp\nsd1E6B.tmp\downloadmr.exe /u4e8de351-1254-4bc4-803a-1e235bc06f2f /e23652982⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD55ebc73650256e9c8ddbcda231db829a1
SHA1988d4535e18754ab2a6248abae96c5697d7dbcd5
SHA2561eaa543842df7795404184e8892a1654b0773dbc9bd8b54c7fdb9e68f4355493
SHA512b21266e76fc7263af982a1336a766e47ccf348ed56b305dbb09f03574c9b2a7309f12200e80d86f9a251381be6e87a41206447f11c51899cb31fba10da1d5270