Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
7c53e621328c4bb3c58cd96dd8635ef5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c53e621328c4bb3c58cd96dd8635ef5.exe
Resource
win10v2004-20231215-en
General
-
Target
7c53e621328c4bb3c58cd96dd8635ef5.exe
-
Size
50KB
-
MD5
7c53e621328c4bb3c58cd96dd8635ef5
-
SHA1
689f181e4eb425ce1e5efa1517c1785e049806c9
-
SHA256
dd24ca74cc9e398392d9a8502ba8da174a7a5aa66fddc657017b60c91e879fd7
-
SHA512
b0743daaecc9487cf40332bd7cc6839d3284a0a1a77f50b983fe8849ace051128e59b0d1bc3a31390822949ab9379e44aeb8aadd28b491e3de08bd51e3e7298d
-
SSDEEP
768:tIyYtIjH4YacTnlXcvbsJZnXy7IYpiwaH1/FFCcDC2hdmX:QtIjYYzxJJy7IYHeRSG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2868 H.exe -
Loads dropped DLL 2 IoCs
pid Process 2920 7c53e621328c4bb3c58cd96dd8635ef5.exe 2920 7c53e621328c4bb3c58cd96dd8635ef5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2868 H.exe 2868 H.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2868 2920 7c53e621328c4bb3c58cd96dd8635ef5.exe 28 PID 2920 wrote to memory of 2868 2920 7c53e621328c4bb3c58cd96dd8635ef5.exe 28 PID 2920 wrote to memory of 2868 2920 7c53e621328c4bb3c58cd96dd8635ef5.exe 28 PID 2920 wrote to memory of 2868 2920 7c53e621328c4bb3c58cd96dd8635ef5.exe 28 PID 2868 wrote to memory of 1208 2868 H.exe 14 PID 2868 wrote to memory of 1208 2868 H.exe 14 PID 2868 wrote to memory of 1208 2868 H.exe 14 PID 2868 wrote to memory of 1208 2868 H.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\7c53e621328c4bb3c58cd96dd8635ef5.exe"C:\Users\Admin\AppData\Local\Temp\7c53e621328c4bb3c58cd96dd8635ef5.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\H.exe"C:\Users\Admin\AppData\Local\Temp\H.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD574fde7b6d99af192d262b9f2cfec4c3f
SHA159076707dcf96ece0731d4b5df2ed92c1e57ddd2
SHA2569395c678469e835d34a7d68727e7f690f208a6bd204bdce187ef5483add38fd0
SHA51263aeed1c33cca239a9f9cdd76c823885f567f9bfe06c5bb59402c3306a5490371ca9097890524bf8d51d2b8ebedb469d0b82806eee421360770f71e2e73a81cb