Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:57 UTC
Static task
static1
Behavioral task
behavioral1
Sample
1f2d86094d2dee83912ad1da56e5dab8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f2d86094d2dee83912ad1da56e5dab8.exe
Resource
win10v2004-20231215-en
General
-
Target
1f2d86094d2dee83912ad1da56e5dab8.exe
-
Size
886KB
-
MD5
1f2d86094d2dee83912ad1da56e5dab8
-
SHA1
00d2373d7ba174fa55044ea75ba35afc55dc9d1d
-
SHA256
6e9397dea8f93407c3d153610ddb3cc102bf0cbb7feaa5636d85f9a54a428382
-
SHA512
2df737f009d8c770b949fe2d7ca3a3c4d98c8a072df49471e505687b58db8a6858b123702e370ec0a31f3f6a305fdf0cc0573602dfa93086679a71706dce111e
-
SSDEEP
24576:FRmJkcoQricOIQxiZY1WNW+TmmAuDeFUGHC:KJZoQrbTFZY1WNW+TjXaC
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2124-0-0x0000000000400000-0x00000000004B0000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2124 1f2d86094d2dee83912ad1da56e5dab8.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe 2124 1f2d86094d2dee83912ad1da56e5dab8.exe
Processes
Network
-
Remote address:8.8.8.8:53Requestwww.speedtest.netIN AResponsewww.speedtest.netIN CNAMEwww.speedtest.net.cdn.cloudflare.netwww.speedtest.net.cdn.cloudflare.netIN A104.18.202.232www.speedtest.net.cdn.cloudflare.netIN A104.18.203.232
-
Remote address:8.8.8.8:53Requestwww.basabots.comIN AResponsewww.basabots.comIN CNAMEbasabots.combasabots.comIN A137.184.227.62