Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
4adec794078fffadccea9cb240bb50cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4adec794078fffadccea9cb240bb50cb.exe
Resource
win10v2004-20231215-en
General
-
Target
4adec794078fffadccea9cb240bb50cb.exe
-
Size
224KB
-
MD5
4adec794078fffadccea9cb240bb50cb
-
SHA1
6ca940aab44e1e4f5afa118e0b1af55059f4cf72
-
SHA256
96e26b6d3e066f014789a584c1a9633ef4751f97dfb924679a0b6ed1c2682a5f
-
SHA512
24c1e7b6ed912fd814bb48edf763c38e19804309ff680f1d106d083c083f13fb6faef7d0017f1b4c808f2f73fbbf85125ba051edf6a8946dd84b84bfc0d50cec
-
SSDEEP
6144:QceszP4/T04LsE6370CjUdapCTI2IOGdpDpB4ST:QcvL4RLpN6UdapCTI2IO6X4ST
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2712 0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2712 0.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2712 0.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3036 wrote to memory of 1992 3036 4adec794078fffadccea9cb240bb50cb.exe 22 PID 3036 wrote to memory of 1992 3036 4adec794078fffadccea9cb240bb50cb.exe 22 PID 3036 wrote to memory of 1992 3036 4adec794078fffadccea9cb240bb50cb.exe 22 PID 3036 wrote to memory of 2032 3036 4adec794078fffadccea9cb240bb50cb.exe 21 PID 3036 wrote to memory of 2032 3036 4adec794078fffadccea9cb240bb50cb.exe 21 PID 3036 wrote to memory of 2032 3036 4adec794078fffadccea9cb240bb50cb.exe 21 PID 1992 wrote to memory of 2712 1992 CMD.exe 18 PID 1992 wrote to memory of 2712 1992 CMD.exe 18 PID 1992 wrote to memory of 2712 1992 CMD.exe 18 PID 1992 wrote to memory of 2712 1992 CMD.exe 18 PID 2712 wrote to memory of 1212 2712 0.exe 7 PID 2712 wrote to memory of 1212 2712 0.exe 7 PID 2712 wrote to memory of 1212 2712 0.exe 7 PID 2712 wrote to memory of 1212 2712 0.exe 7 PID 2712 wrote to memory of 1212 2712 0.exe 7 PID 2712 wrote to memory of 1212 2712 0.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\4adec794078fffadccea9cb240bb50cb.exe"C:\Users\Admin\AppData\Local\Temp\4adec794078fffadccea9cb240bb50cb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\system32\CMD.exeCMD.exe /k start %TEMP%\1.jpg2⤵PID:2032
-
-
C:\Windows\system32\CMD.exeCMD.exe /k start %TEMP%\0.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1992
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\0.exeC:\Users\Admin\AppData\Local\Temp\0.exe1⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712