Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
0f99e862c8db88bbc85a573eb665f6a3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f99e862c8db88bbc85a573eb665f6a3.exe
Resource
win10v2004-20231222-en
General
-
Target
0f99e862c8db88bbc85a573eb665f6a3.exe
-
Size
21KB
-
MD5
0f99e862c8db88bbc85a573eb665f6a3
-
SHA1
6010851118b3ea3495daab4c86c79b4f7d09829b
-
SHA256
158235bd0d096bcfe730c3d51c3205b1a724cb7fb6792bbc771fddceed8dfff6
-
SHA512
413bd8fcef3e709bff8180ec70eba3f8e7868703bf2a08ac1ca58cc5a959ca67412254d4820d8f1f496ca5ad2432080f7b898320d3cb9ff4d1f1b29e7c243b46
-
SSDEEP
384:q7XZiECNtZLUNMcU71MWx4CpWwwoQhRZcLq0xmie5ioCSOHZYAUJMhFY:q7piEMLUNMKuWwwoQZ0a5BC/UJMhFY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2696 anymie360.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\anymie360.ini 0f99e862c8db88bbc85a573eb665f6a3.exe File opened for modification C:\Windows\SysWOW64\anymie360.exe 0f99e862c8db88bbc85a573eb665f6a3.exe File created C:\Windows\SysWOW64\anymie360.exe 0f99e862c8db88bbc85a573eb665f6a3.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 632 0f99e862c8db88bbc85a573eb665f6a3.exe 632 0f99e862c8db88bbc85a573eb665f6a3.exe 2696 anymie360.exe 2696 anymie360.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 632 wrote to memory of 2696 632 0f99e862c8db88bbc85a573eb665f6a3.exe 89 PID 632 wrote to memory of 2696 632 0f99e862c8db88bbc85a573eb665f6a3.exe 89 PID 632 wrote to memory of 2696 632 0f99e862c8db88bbc85a573eb665f6a3.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f99e862c8db88bbc85a573eb665f6a3.exe"C:\Users\Admin\AppData\Local\Temp\0f99e862c8db88bbc85a573eb665f6a3.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\anymie360.exeC:\Windows\system32\anymie360.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD50f99e862c8db88bbc85a573eb665f6a3
SHA16010851118b3ea3495daab4c86c79b4f7d09829b
SHA256158235bd0d096bcfe730c3d51c3205b1a724cb7fb6792bbc771fddceed8dfff6
SHA512413bd8fcef3e709bff8180ec70eba3f8e7868703bf2a08ac1ca58cc5a959ca67412254d4820d8f1f496ca5ad2432080f7b898320d3cb9ff4d1f1b29e7c243b46