Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
1338e5b87bd562b59e58164cbd14e41b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1338e5b87bd562b59e58164cbd14e41b.exe
Resource
win10v2004-20231215-en
General
-
Target
1338e5b87bd562b59e58164cbd14e41b.exe
-
Size
11KB
-
MD5
1338e5b87bd562b59e58164cbd14e41b
-
SHA1
2cdd38d7fb70dfc1deaf025109dea5b170d0e964
-
SHA256
ed4053d15783e6fcb22313311ba6ee9aa6973111e1563956921c44eb1cc88210
-
SHA512
fdc0bea699f0a105cf01b14ae0849a62f006c871d42b1d15bc6fa7bddb63bff6d9eb044065591ab361eb81a2ef2b0a5440e6ff80144861d0ce2bce1a1aa60852
-
SSDEEP
192:9mUWKs/RnKfzShH/JFxRmyja4QhiP7UlZSyGjpjWDwyl1XN+gB7Q:6K+dKfzQHxFxRmyja4QhiP7UlY/pjKwj
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 2716 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 2772 1338e5b87bd562b59e58164cbd14e41b.exe 2772 1338e5b87bd562b59e58164cbd14e41b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2716 2772 1338e5b87bd562b59e58164cbd14e41b.exe 27 PID 2772 wrote to memory of 2716 2772 1338e5b87bd562b59e58164cbd14e41b.exe 27 PID 2772 wrote to memory of 2716 2772 1338e5b87bd562b59e58164cbd14e41b.exe 27 PID 2772 wrote to memory of 2716 2772 1338e5b87bd562b59e58164cbd14e41b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\1338e5b87bd562b59e58164cbd14e41b.exe"C:\Users\Admin\AppData\Local\Temp\1338e5b87bd562b59e58164cbd14e41b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5ae0672ea153cb5db873a5b5c81ff34a0
SHA187010b8a730a5b261f1c257bb93d15409589a53f
SHA256e2ea01f297e75c6aa1d29bce1603c305f732916fade4a91a16cd06d22dd8a9b5
SHA512adc45dd076abbec0282448a2d9e8807568cdb6af6dfaa483b43035b2e2cac15b39cb6647cead1fc5fd512edd696f6f121de7f32ca67ab99d6617b7c200d1ee97