Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
4s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
618fa1db7acc7f02d511756a2fdb6307.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
618fa1db7acc7f02d511756a2fdb6307.exe
Resource
win10v2004-20231215-en
General
-
Target
618fa1db7acc7f02d511756a2fdb6307.exe
-
Size
367KB
-
MD5
618fa1db7acc7f02d511756a2fdb6307
-
SHA1
f14c94c1135d59846597669e6e9dfc1423a53fe7
-
SHA256
21f81570630af5e52ce9804d80cf060a5f0553856f9154f325e9fdcbc2ef10f8
-
SHA512
d35912817b248fd468c22be1565e6d69da241b3746e94c2154311f821f939af50dbd1adc5aef44ef709480bf12a19ec5679298f7bfe2d873fa48bf1551aa899f
-
SSDEEP
6144:iO/N4yidWNLbii5bkgVuN+xSKV7Wkrsf7LsQH8frtCj6SLoI:iOVedQXikbkgaISKVy8A6SLoI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2044 62F0DE83-45A3-44DB-9697-4A140AC85636.exe -
Loads dropped DLL 6 IoCs
pid Process 2668 618fa1db7acc7f02d511756a2fdb6307.exe 2668 618fa1db7acc7f02d511756a2fdb6307.exe 2668 618fa1db7acc7f02d511756a2fdb6307.exe 2668 618fa1db7acc7f02d511756a2fdb6307.exe 2668 618fa1db7acc7f02d511756a2fdb6307.exe 2668 618fa1db7acc7f02d511756a2fdb6307.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2044 2668 618fa1db7acc7f02d511756a2fdb6307.exe 28 PID 2668 wrote to memory of 2044 2668 618fa1db7acc7f02d511756a2fdb6307.exe 28 PID 2668 wrote to memory of 2044 2668 618fa1db7acc7f02d511756a2fdb6307.exe 28 PID 2668 wrote to memory of 2044 2668 618fa1db7acc7f02d511756a2fdb6307.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\618fa1db7acc7f02d511756a2fdb6307.exe"C:\Users\Admin\AppData\Local\Temp\618fa1db7acc7f02d511756a2fdb6307.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\72ed3c1a-7805-442f-9563-2e38bdc053ec\62F0DE83-45A3-44DB-9697-4A140AC85636.exe"C:\72ed3c1a-7805-442f-9563-2e38bdc053ec\62F0DE83-45A3-44DB-9697-4A140AC85636.exe" -y -p8FEF45FA-F2B3-40D5-B6AB-8B0A80D765212⤵
- Executes dropped EXE
PID:2044
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" c:\72ed3c1a-7805-442f-9563-2e38bdc053ec\start.hta2⤵PID:2800
-