Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 02:16
Static task
static1
Behavioral task
behavioral1
Sample
4d148a355e035d52da1bb710e60f55fd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d148a355e035d52da1bb710e60f55fd.exe
Resource
win10v2004-20231222-en
General
-
Target
4d148a355e035d52da1bb710e60f55fd.exe
-
Size
2.7MB
-
MD5
4d148a355e035d52da1bb710e60f55fd
-
SHA1
cccc50cf6adbe84d967ac2b9088f706d4165daf2
-
SHA256
e10530349cf0d2f459aa768f3f0c2b3974201c41faa24854209742e34a70721b
-
SHA512
5d5c1f772144d38c97070f3a821f6492d28a991ad251e052a04e735b2afc3dd42f30f06f24e2ca255fe00517c7e23f6668826ecaec26da6f1d58effd0a1a6059
-
SSDEEP
49152:oJy796EvMtTx435MtV+O14pWPMPdEAnPc5aIgqINUB+EuWi0+CSqvVBI1r/:d7AEvgVOI4QPc6dIcRso8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2120 4d148a355e035d52da1bb710e60f55fd.tmp 2756 WMF.exe -
Loads dropped DLL 5 IoCs
pid Process 1104 4d148a355e035d52da1bb710e60f55fd.exe 2120 4d148a355e035d52da1bb710e60f55fd.tmp 2120 4d148a355e035d52da1bb710e60f55fd.tmp 2120 4d148a355e035d52da1bb710e60f55fd.tmp 2120 4d148a355e035d52da1bb710e60f55fd.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2756 WMF.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1104 wrote to memory of 2120 1104 4d148a355e035d52da1bb710e60f55fd.exe 28 PID 1104 wrote to memory of 2120 1104 4d148a355e035d52da1bb710e60f55fd.exe 28 PID 1104 wrote to memory of 2120 1104 4d148a355e035d52da1bb710e60f55fd.exe 28 PID 1104 wrote to memory of 2120 1104 4d148a355e035d52da1bb710e60f55fd.exe 28 PID 1104 wrote to memory of 2120 1104 4d148a355e035d52da1bb710e60f55fd.exe 28 PID 1104 wrote to memory of 2120 1104 4d148a355e035d52da1bb710e60f55fd.exe 28 PID 1104 wrote to memory of 2120 1104 4d148a355e035d52da1bb710e60f55fd.exe 28 PID 2120 wrote to memory of 2756 2120 4d148a355e035d52da1bb710e60f55fd.tmp 29 PID 2120 wrote to memory of 2756 2120 4d148a355e035d52da1bb710e60f55fd.tmp 29 PID 2120 wrote to memory of 2756 2120 4d148a355e035d52da1bb710e60f55fd.tmp 29 PID 2120 wrote to memory of 2756 2120 4d148a355e035d52da1bb710e60f55fd.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d148a355e035d52da1bb710e60f55fd.exe"C:\Users\Admin\AppData\Local\Temp\4d148a355e035d52da1bb710e60f55fd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\is-22J27.tmp\4d148a355e035d52da1bb710e60f55fd.tmp"C:\Users\Admin\AppData\Local\Temp\is-22J27.tmp\4d148a355e035d52da1bb710e60f55fd.tmp" /SL5="$50150,2423269,153088,C:\Users\Admin\AppData\Local\Temp\4d148a355e035d52da1bb710e60f55fd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\is-LP780.tmp\WMF.exe"C:\Users\Admin\AppData\Local\Temp\is-LP780.tmp\WMF.exe" /aid=151 /sub=22 /sid=80 /name="berserk.film.torrent_final.zip" /fid= /stats=eZ0r7/y5w0CIiPIZDZ4v/9DwDGe04OJ2TB8pcK03kJPgNcfTd9SDmzOSmrlbczzjao9bLeh1aI6WZc14/aQ0yA== /param=03⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
445KB
MD56b8251aa8212ef42603decd31eb71357
SHA13078ee77e58772b6459911699c88173b0403e9c3
SHA256efc6a99645236cac7e74fa833c9a391cf1c9498652dd94fcbedcd3506b5dd953
SHA512c8df8b90b312ecff9189a5d6a2ab1a41c065db20bbe066df1affc79c9e283cee4b63946e5e8654ccc5d2d390316e3886e9960e6699cbc90c1daedec7f95186d0
-
Filesize
726KB
MD5d4bf5ee9301edc431bbc79532258c08a
SHA1e80b0d170238a2544b20c50a74c00f796a84e162
SHA256e461703bda4a0267cf14e70e792a85e484d2e0ff618a872e8be6c096db1037ed
SHA5125f39ac3470127fc74a9268f271e7d99bcb7a4cc364a32e2be09a55654aa099276b05b96174574f3debc8fb36fc6879bd3a4edab802704838e2a479c7af96deab
-
Filesize
2KB
MD54c219b78a305d3e52c811542154bb224
SHA17efe3e383b29c808cfb3ad0fd90d627ea7b2b2bf
SHA256a0dbdc08f771e32a5ef06f47b436afb270e860578971a974db0c34c0c1366a7c
SHA512bced9584568b011c0b2013e48d6b9503f77b01c57e2049722326a40363ce42c533e590c4583cf0cf3a5391f3208db8135b5afdc27ae7359af3ded66b11e628b8
-
Filesize
1.1MB
MD58811a0652c18dbcf68955f99df537eb8
SHA170cff6c43c0f873295dc085018639dff02f33012
SHA256d69f51e65e3944891ec9c392b3d7410d81f8f93e55b9071584bfd1d384862230
SHA512ed2ff6cfe272a8ae260233a1bb653adc0eaae13388418a9dea692b9924999d89b8677b8669fa24dcb0c606cfca7045bef779e1c58547f3f17d5096cbbe31d60a
-
Filesize
544KB
MD5143150b496aefddce3565c82630fd4b3
SHA176165ed38ee9d07682ea13b39312437435dd9d7f
SHA25601c30a5ce4660fec79545f8725d7eb5aac61fe208e017eb06945c33dfa6585d1
SHA5123b9ff9bfdb38f436942fb188c78fe39a7d27ab8f9901b98e81a14b4ba418aa0d50ab9fb6d561541321539aa95171b578c5be7cbfa135fb38aba877e054ab9038
-
Filesize
710KB
MD53d1a6bca42be3143d829f7bfc9568c3b
SHA1e6d4e8b7c460022cd1c11dea879f09cbabd251d2
SHA2565413681aaa4a662bbb544c6423f44a99206f9689bdedec06c793b8784316fdec
SHA5126c4d6950bf895715040c5074aeeb069916e4a4acfa24a6290fb0216305e1f83f9694531bedc6f6e5659add28b9614224b4015bf33295113adca104baa8ffd25c
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3