Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
1af0589313b5d33a65c970803e54cb9a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1af0589313b5d33a65c970803e54cb9a.exe
Resource
win10v2004-20231215-en
General
-
Target
1af0589313b5d33a65c970803e54cb9a.exe
-
Size
123KB
-
MD5
1af0589313b5d33a65c970803e54cb9a
-
SHA1
42735deb9b7f2306fe084a74de29b9038aeee665
-
SHA256
17bb8d4545085bace996d4d0d18e88190971a13089e17ba1c8cdd21746db0d2c
-
SHA512
cff71a9dcfb1d4bf15e948b9d192c798caec09bcbdacf56f78344924305c6754f64ec02610a8ddaade7a8a3eca24340a8d37adc733def3283d3d3c88b441d4f6
-
SSDEEP
3072:SKmfBpGzw3sqOp/OcXMVsAd/yEbSYXuDYUBRoIFZYov2v/:xmfBpzdsidFeff/ZYLv/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2316 2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\2.exe 1af0589313b5d33a65c970803e54cb9a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2660 2316 WerFault.exe 28 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2372 1af0589313b5d33a65c970803e54cb9a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2316 2372 1af0589313b5d33a65c970803e54cb9a.exe 28 PID 2372 wrote to memory of 2316 2372 1af0589313b5d33a65c970803e54cb9a.exe 28 PID 2372 wrote to memory of 2316 2372 1af0589313b5d33a65c970803e54cb9a.exe 28 PID 2372 wrote to memory of 2316 2372 1af0589313b5d33a65c970803e54cb9a.exe 28 PID 2316 wrote to memory of 2660 2316 2.exe 29 PID 2316 wrote to memory of 2660 2316 2.exe 29 PID 2316 wrote to memory of 2660 2316 2.exe 29 PID 2316 wrote to memory of 2660 2316 2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1af0589313b5d33a65c970803e54cb9a.exe"C:\Users\Admin\AppData\Local\Temp\1af0589313b5d33a65c970803e54cb9a.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\2.exe"C:\Windows\2.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 363⤵
- Program crash
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5e7f1aa4c2dc3575759f56a57702fca66
SHA12efb5e1c28cdde1cb4a7157b3bd2ec45897254ea
SHA2569a6de1e0e0826d40c7275498a685dc714bb9873569a208a506208c9fbacc904c
SHA512e4e3301f3347cf92aa5b88b6e51d9ccdb1135cdcc38a86d76720270503a4dc1161f8d7ba980d63fc3cb9b320fe171c52dbd191ae020a78edf62ccc066115d403