Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
8s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
13bdc0c585544fbe18ff4edd7d4af294.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13bdc0c585544fbe18ff4edd7d4af294.exe
Resource
win10v2004-20231215-en
General
-
Target
13bdc0c585544fbe18ff4edd7d4af294.exe
-
Size
593KB
-
MD5
13bdc0c585544fbe18ff4edd7d4af294
-
SHA1
a8bf5125de8bc439490755332703e67a8742a193
-
SHA256
06aef60871153b731f4ed99aa1cf638e022da25cd62cd4d121a3e9799c5fbeb4
-
SHA512
413349dc6e8a3cdd9bac8d9175a98c45c659eab6088c14569bff80bd4ec972ecbbfcc289f5286ced88a1d43799e0cc64b5975d17555f1a43cb92ce13b1e29f89
-
SSDEEP
12288:lwMDD4z8x0bDiuWkPDBfOkAXlgmpQ5K/dQlnrH2DDm:ltghsSD5o1r68/dQlD4Dm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2896 DownloadManager.exe -
Loads dropped DLL 8 IoCs
pid Process 2168 13bdc0c585544fbe18ff4edd7d4af294.exe 2168 13bdc0c585544fbe18ff4edd7d4af294.exe 2168 13bdc0c585544fbe18ff4edd7d4af294.exe 2168 13bdc0c585544fbe18ff4edd7d4af294.exe 2168 13bdc0c585544fbe18ff4edd7d4af294.exe 2168 13bdc0c585544fbe18ff4edd7d4af294.exe 2168 13bdc0c585544fbe18ff4edd7d4af294.exe 2168 13bdc0c585544fbe18ff4edd7d4af294.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2896 2168 13bdc0c585544fbe18ff4edd7d4af294.exe 28 PID 2168 wrote to memory of 2896 2168 13bdc0c585544fbe18ff4edd7d4af294.exe 28 PID 2168 wrote to memory of 2896 2168 13bdc0c585544fbe18ff4edd7d4af294.exe 28 PID 2168 wrote to memory of 2896 2168 13bdc0c585544fbe18ff4edd7d4af294.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\13bdc0c585544fbe18ff4edd7d4af294.exe"C:\Users\Admin\AppData\Local\Temp\13bdc0c585544fbe18ff4edd7d4af294.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\DM_LOzoPHi1aY\DownloadManager.exeDownloadManager.exe "C:\Users\Admin\AppData\Local\Temp\13bdc0c585544fbe18ff4edd7d4af294.exe"2⤵
- Executes dropped EXE
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
280KB
MD55a11494d92b16eec193cc8e458f00048
SHA1d289a4d4f5ec6bc650e905f62e569371178c2e72
SHA2569d90ce36e00aa0e35a711166b337a209c250870b2525043e49431cf60fbfbade
SHA512f13e39a2d7bb2560fb44236571c106ab5077ca7e9ca7ecad8b7c149e16bdbe9120c1b01191ea5e4eb4d5e7ac5e7b6649a739fcebd9bb1f022a6778ae5637084a
-
Filesize
247KB
MD52715897afe4edd43f765348b7ceb0595
SHA12a89a7627d5d78b63a88a1fcd748790f1c6ea371
SHA256731e983ea9d6c3dd23330d6f8ea28c62e31769cdac194caf0a6c3047f7529c2e
SHA512f74770948020f4ee910a79abf53beabe5e174afc497d0936f6d9a43caac18df1216ccdb6c6068cf6fddb11af7836a9309204513c1a74a0eef8b0bd9935d8bdb5
-
Filesize
165KB
MD506a2a4422078d1d09039e5c3cdd0845b
SHA146baf1837e31e5e0d31ef9071807c651d44e26f8
SHA256788e2459d1f54e572d515233d884a5a360c4434a168b553031d22d711cc8d4d1
SHA51292d637fbde89ec037c67a99b628f05dcab657870d51eecbf4a0a2a7797679092ef5fe1c272a307a50c6d5f6d4b6eae423391635c237e139dddcea34be90f84cf
-
Filesize
267KB
MD5aec92061e1af6c5b1fe058dbad480e90
SHA17e72946663d3a8ae20468e98d98ec18568343da9
SHA256fd6f9ab61fc6b8761f78dff9f445a27c055ec7c5ad5e8a08b797d2cb922d5c5e
SHA512b0f6ed1b8b08b21191f7d547deebfdddc6a7ab01ecdef032116a4f12fe52424bd0c48aeced5a50ba7b142327274612eb1f5b886fa8ff5952e81fddb255305554
-
Filesize
235KB
MD5317586551f09ea118269ddb7209a5d80
SHA17ead71d39c28551d571a9e28362caf58d55b2722
SHA256bf0e4307864f2f98329f4e853cb595da84ae96dedd8c6812f6d175656a13c98a
SHA512c48bb3cef0b01098a2e7b74dd2ba61d3032a11461b611e78dd9cd8da0f727981208d609c29e1a80d0aea4009c362872e0cf8fbc3780e6fcb756b3bd265359b50
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
20KB
MD5c498ae64b4971132bba676873978de1e
SHA192e4009cd776b6c8616d8bffade7668ef3cb3c27
SHA2565552bdde7e4113393f683ef501e4cc84dccc071bdc51391ea7fa3e7c1d49e4e8
SHA5128e5ca35493f749a39ceae6796d2658ba10f7d8d9ceca45bb4365b338fabd1dfa9b9f92e33f50c91b0273e66adfbce4b98b09c15fd2473f8b214ed797462333d7
-
Filesize
16KB
MD5a555472395178ac8c733d90928e05017
SHA1f44b192d66473f01a6540aaec4b6c9ac4c611d35
SHA25682ae08fced4a1f9a7df123634da5f4cb12af4593a006bef421a54739a2cbd44e
SHA512e6d87b030c45c655d93b2e76d7437ad900df5da2475dd2e6e28b6c872040491e80f540b00b6091d16bc8410bd58a1e82c62ee1b17193ef8500a153d4474bb80a