Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 13:12
Static task
static1
Behavioral task
behavioral1
Sample
1994cf1e802fe30729006515279e46bb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1994cf1e802fe30729006515279e46bb.exe
Resource
win10v2004-20231222-en
General
-
Target
1994cf1e802fe30729006515279e46bb.exe
-
Size
756KB
-
MD5
1994cf1e802fe30729006515279e46bb
-
SHA1
2e2b6bd951ae0151b98cf14e9bc7726761e7b348
-
SHA256
55ba4eeb9df7892cdc66d189f684d65912c8779b5c17b74d88bf24d198f3b5d2
-
SHA512
02fcdfb6d466f3f55e779c9531a25f38a96300b90d95f8997406f168ee396312c6ad403d36ac39741a94fd942d8d3cdf2d71a0789e0c69f8bd6995beac7e746d
-
SSDEEP
12288:L20iw1rY2Iuol4jturxCoq+gOGyOHA+l1lhGNb5DgAF7rmvgLsF11VsC/I:L205FhSOoCrpBpGNb5DgY7rmvZf5/I
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1912 1994cf1e802fe30729006515279e46bb.tmp -
Loads dropped DLL 3 IoCs
pid Process 3052 1994cf1e802fe30729006515279e46bb.exe 1912 1994cf1e802fe30729006515279e46bb.tmp 1912 1994cf1e802fe30729006515279e46bb.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1912 1994cf1e802fe30729006515279e46bb.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1912 3052 1994cf1e802fe30729006515279e46bb.exe 28 PID 3052 wrote to memory of 1912 3052 1994cf1e802fe30729006515279e46bb.exe 28 PID 3052 wrote to memory of 1912 3052 1994cf1e802fe30729006515279e46bb.exe 28 PID 3052 wrote to memory of 1912 3052 1994cf1e802fe30729006515279e46bb.exe 28 PID 3052 wrote to memory of 1912 3052 1994cf1e802fe30729006515279e46bb.exe 28 PID 3052 wrote to memory of 1912 3052 1994cf1e802fe30729006515279e46bb.exe 28 PID 3052 wrote to memory of 1912 3052 1994cf1e802fe30729006515279e46bb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1994cf1e802fe30729006515279e46bb.exe"C:\Users\Admin\AppData\Local\Temp\1994cf1e802fe30729006515279e46bb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\is-HN191.tmp\1994cf1e802fe30729006515279e46bb.tmp"C:\Users\Admin\AppData\Local\Temp\is-HN191.tmp\1994cf1e802fe30729006515279e46bb.tmp" /SL5="$3009A,534861,54272,C:\Users\Admin\AppData\Local\Temp\1994cf1e802fe30729006515279e46bb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
680KB
MD5e60a74a65005e4c4f61cbe9c09d368df
SHA11d649b2ab5e08632d64e23f5f9e5675b68e184b4
SHA25678f6692d50d07bd78a97294d196f9ae7d1fc48b058375e5d7bb766970faab758
SHA512a73b84739f4da0827976cf473e63ba3dc7649ab2d37be13c8fb786487d0dc7ef5b2bd446d8c745d75266447357bde4f32f58f1f1c92b156f06f141fea2873856