Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 11:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe
-
Size
876KB
-
MD5
6ba7d7da1e1cf967a4727f9b2e2a0ea5
-
SHA1
99f1c2f09a84a624b919994aeb22e6f408a026ce
-
SHA256
144c1c0c8cd8b680730fd04b7ea6821a68cad30f15d486c7049c6a10736bec7c
-
SHA512
fe486f839f0b58a2f22177f43e5718d38d95f37621a8d0c44eef1f7c36c27c5583507c92be142038372fa9ee012ae451502c7fdbd4dc6d009e26dd0c70248333
-
SSDEEP
24576:ZgqMLKmtvPyHu7EgwY97y9pNg4W7HM8mcN+2QHCvLt:ZRiKmHyOg49/p7s8LQk
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2868 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 2868 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 2868 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 2868 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2120 1140 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 17 PID 1140 wrote to memory of 2120 1140 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 17 PID 1140 wrote to memory of 2120 1140 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 17 PID 1140 wrote to memory of 2120 1140 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 17 PID 1140 wrote to memory of 2120 1140 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 17 PID 1140 wrote to memory of 2120 1140 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 17 PID 1140 wrote to memory of 2120 1140 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 17 PID 2120 wrote to memory of 2868 2120 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 18 PID 2120 wrote to memory of 2868 2120 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 18 PID 2120 wrote to memory of 2868 2120 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 18 PID 2120 wrote to memory of 2868 2120 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 18 PID 2120 wrote to memory of 2868 2120 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 18 PID 2120 wrote to memory of 2868 2120 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 18 PID 2120 wrote to memory of 2868 2120 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe"C:\Users\Admin\AppData\Local\Temp\6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe"C:\Users\Admin\AppData\Local\Temp\6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe"C:\Users\Admin\AppData\Local\Temp\6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2868
-
-