Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
27e4309e108b1792998d2a705f68825a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
27e4309e108b1792998d2a705f68825a.exe
Resource
win10v2004-20231222-en
General
-
Target
27e4309e108b1792998d2a705f68825a.exe
-
Size
1.6MB
-
MD5
27e4309e108b1792998d2a705f68825a
-
SHA1
cd2689b7b6a12e52f40f13bbe15aa802d01e55bf
-
SHA256
9f3a214a121a372d8fff848bc24bd04f0fb4ace222c5fa469c2ce445f553215a
-
SHA512
7ad14763f0ff151c6ec7cf0b1dc49420036d6a6df5cdc1960ca7d40675695b8ace7cce1a07dcc4f7efa0e7145abaab7c8467192be440ce0d472c4835dcc45689
-
SSDEEP
49152:LGNvYZjmoi7us4FYNfWg7Eqq9FMyBVz1QMXx:SNqSoioWwaSGMh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2772 is-BQUQG.tmp -
Loads dropped DLL 3 IoCs
pid Process 2536 27e4309e108b1792998d2a705f68825a.exe 2772 is-BQUQG.tmp 2772 is-BQUQG.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2772 is-BQUQG.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2772 2536 27e4309e108b1792998d2a705f68825a.exe 28 PID 2536 wrote to memory of 2772 2536 27e4309e108b1792998d2a705f68825a.exe 28 PID 2536 wrote to memory of 2772 2536 27e4309e108b1792998d2a705f68825a.exe 28 PID 2536 wrote to memory of 2772 2536 27e4309e108b1792998d2a705f68825a.exe 28 PID 2536 wrote to memory of 2772 2536 27e4309e108b1792998d2a705f68825a.exe 28 PID 2536 wrote to memory of 2772 2536 27e4309e108b1792998d2a705f68825a.exe 28 PID 2536 wrote to memory of 2772 2536 27e4309e108b1792998d2a705f68825a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\27e4309e108b1792998d2a705f68825a.exe"C:\Users\Admin\AppData\Local\Temp\27e4309e108b1792998d2a705f68825a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\is-UND1K.tmp\is-BQUQG.tmp"C:\Users\Admin\AppData\Local\Temp\is-UND1K.tmp\is-BQUQG.tmp" /SL4 $30120 "C:\Users\Admin\AppData\Local\Temp\27e4309e108b1792998d2a705f68825a.exe" 1455235 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5ad91ef99ae13b89185217eb3ead6d476
SHA1fa1948a34a2a0b20f9e9e30bc1de56705784a54c
SHA2568d80dae2c569c036fe062a2238ae72b23e0c7841842644e93561db97de075607
SHA512e2e2c3a92437208f68699a6c01c2297c59981f87cff8e9d2f85a9ce92264f2969edbb7b580ddc786e17e9bd76bf5c8984e375bf96c3441193c63a6fa57df2572
-
Filesize
16KB
MD57b7f59fc057402e4e3da1399d8a0436a
SHA1a0922ab06d0d42cd483292786ba87cea5d6cfaa8
SHA256708187c4714840ee3811b662084c150cf6ec2fd72f2686530b07b66e21481637
SHA5124069e82605eab2a341f5d00d8bb636f712c1145710540c8c8a40535992971e030fb724cf1143114a5d57f7ba4c0a91ce71a7f948910afbf4a3c684864269ff4f
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
4KB
MD588778081831a2db8b0362cc73fcf3418
SHA19a78ac90f24045ef15c6ba67bcd232f9a88e40fc
SHA256e783a0be14bf6ecedc35fcdbdb4eb3ac27ccf5bbd464b7f78625e6ed3488414d
SHA5122b66daaf55ac878a22ea8b2e513e42df312c6b5d6440716d4e8b7b1bfdbb1d9c7c2b304743077d9db8be80d94f6c29eed4bc813916e9b16a6f41241451ee5843