Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
7f0df1a55d049fbb332d5674db0e5e02.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f0df1a55d049fbb332d5674db0e5e02.exe
Resource
win10v2004-20231215-en
General
-
Target
7f0df1a55d049fbb332d5674db0e5e02.exe
-
Size
50KB
-
MD5
7f0df1a55d049fbb332d5674db0e5e02
-
SHA1
025212b0196fdb181eca502a9c85c2773e324293
-
SHA256
60cbbbddfcf5652e01b7fa8805170a9e70d16b5b6494d4035aece8e123c223f4
-
SHA512
9aba9a7d53ec9c81356ee2c82928a6490d6b712ec2ddb7a63ce4f448c69478d7cd17a33bbb1ba037e673501f72a44367e07aa3b0bcd3b071f206f317e32dd3e8
-
SSDEEP
768:WayYtIjH4YacTnlXcvbsJZnXy7IYpiwaH1/FFCcDC2hdmX:NtIjYYzxJJy7IYHeRSG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2772 H.exe -
Loads dropped DLL 2 IoCs
pid Process 2000 7f0df1a55d049fbb332d5674db0e5e02.exe 2000 7f0df1a55d049fbb332d5674db0e5e02.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2772 H.exe 2772 H.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2772 2000 7f0df1a55d049fbb332d5674db0e5e02.exe 28 PID 2000 wrote to memory of 2772 2000 7f0df1a55d049fbb332d5674db0e5e02.exe 28 PID 2000 wrote to memory of 2772 2000 7f0df1a55d049fbb332d5674db0e5e02.exe 28 PID 2000 wrote to memory of 2772 2000 7f0df1a55d049fbb332d5674db0e5e02.exe 28 PID 2772 wrote to memory of 1308 2772 H.exe 8 PID 2772 wrote to memory of 1308 2772 H.exe 8 PID 2772 wrote to memory of 1308 2772 H.exe 8 PID 2772 wrote to memory of 1308 2772 H.exe 8
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\7f0df1a55d049fbb332d5674db0e5e02.exe"C:\Users\Admin\AppData\Local\Temp\7f0df1a55d049fbb332d5674db0e5e02.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\H.exe"C:\Users\Admin\AppData\Local\Temp\H.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD574fde7b6d99af192d262b9f2cfec4c3f
SHA159076707dcf96ece0731d4b5df2ed92c1e57ddd2
SHA2569395c678469e835d34a7d68727e7f690f208a6bd204bdce187ef5483add38fd0
SHA51263aeed1c33cca239a9f9cdd76c823885f567f9bfe06c5bb59402c3306a5490371ca9097890524bf8d51d2b8ebedb469d0b82806eee421360770f71e2e73a81cb