Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
77bd9a9ddfb5b84aa97ba08f75360756.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
77bd9a9ddfb5b84aa97ba08f75360756.exe
Resource
win10v2004-20231222-en
General
-
Target
77bd9a9ddfb5b84aa97ba08f75360756.exe
-
Size
561KB
-
MD5
77bd9a9ddfb5b84aa97ba08f75360756
-
SHA1
03980cc97d3b1ed2b1379aebfb75a2c9a68c670a
-
SHA256
64f6bed3f06ba8ef09531205314922a32ef9503d9846554e537d0df899a9b41e
-
SHA512
4a0c0a8a28a0fca539327f897ec16c109c3dc1919900c0cfa756a0c8e3fed1ca5f856f58a2e0ef204d50f69ed8b42654526e12e8a389d6ea15b0955dfa636b49
-
SSDEEP
12288:pM/DX9GrF9V12HLJvoHLJvKIHLJvoHLJva1e9Vnk9:pMLX8r/V1ILJeLJSmLJeLJi1AVnk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2196 SVZ.AmyXan 1.1.exe -
Loads dropped DLL 2 IoCs
pid Process 2056 77bd9a9ddfb5b84aa97ba08f75360756.exe 2056 77bd9a9ddfb5b84aa97ba08f75360756.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2196 SVZ.AmyXan 1.1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2196 2056 77bd9a9ddfb5b84aa97ba08f75360756.exe 28 PID 2056 wrote to memory of 2196 2056 77bd9a9ddfb5b84aa97ba08f75360756.exe 28 PID 2056 wrote to memory of 2196 2056 77bd9a9ddfb5b84aa97ba08f75360756.exe 28 PID 2056 wrote to memory of 2196 2056 77bd9a9ddfb5b84aa97ba08f75360756.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\77bd9a9ddfb5b84aa97ba08f75360756.exe"C:\Users\Admin\AppData\Local\Temp\77bd9a9ddfb5b84aa97ba08f75360756.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\~sfx006CD0742C\SVZ.AmyXan 1.1.exe"C:\Users\Admin\AppData\Local\Temp\~sfx006CD0742C\SVZ.AmyXan 1.1.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD59d0ae76e4bf840eb41f375a63667937c
SHA1f13ec9f7ea240061444dad29bad06ed410f6550a
SHA2560db48551ea6f5b394c9a5975335b5f95a516fa2ee05560404616177728f3e70d
SHA51265ad4cb306ef4e604c2b1800cf3cd7b08c3d3a9c166b3fb1aa05c2d18380d4297dbc08ad30bfe899121ff317b706c830370398437f3f5bac9e49b2ed162d5b71
-
Filesize
17KB
MD5dcd8fdba223e715f0932d12c411e9d50
SHA1e995f7c434485340ea4f1156202caa9022c40a8d
SHA256990043425b58e8b3873399b750a3aa6ab4144bbe69e232e7434aa78cecf8d6ea
SHA5126e6b26a80a91b6a02c8d464043646e994d2532017b5557c81c203c3e736c416115ff2b27d25542eb219ed0f8f6e724bd3d47174063b43a65000e7a57f0239da1
-
Filesize
64KB
MD5be3b9615291db2e89cb8be1c94f82863
SHA1eb983fe52da5eb23f3c59822c57a1f966cc07bce
SHA256a71026c039e70a504ec9a73301c087dbaef0f271c35cc719a516b8fae1d2ce75
SHA51297f942511d217cb23ecef443bd4390c4d2f59fa992c487364c32b415372f56ea076e0d18496cf6ba645a94d353245df74956c737482ad6c5116beff225167e9e
-
Filesize
65KB
MD52394be32f6417a3f90f84891537ef732
SHA1a9bdcd6b0b9a5834c1984db18f9c6b4608fba321
SHA2560fb1d9eeb4eb6824007ac78c1e1ea3e9de79778eda76349f372892d3be845bb2
SHA51249cc740535c3eaa0391c124a1581d9384274ad6cf94999ea998dd4c1d31f9417e482ce662f40b344f936955b042f19978287c4096ae5b9e402930f597c178957