Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
53c255f14b5e6cee23ad734ac8fcd23c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53c255f14b5e6cee23ad734ac8fcd23c.exe
Resource
win10v2004-20231215-en
General
-
Target
53c255f14b5e6cee23ad734ac8fcd23c.exe
-
Size
209KB
-
MD5
53c255f14b5e6cee23ad734ac8fcd23c
-
SHA1
d19cc516c77540b39d5a377f4bf4b73fd6a14e67
-
SHA256
7baf64ac0690d77323acafcc9e02cafde6e365a770580580b851e06d4d8644dd
-
SHA512
86e168883be33b193a87c5ac604d8e194401af219cbdcb9cabae5c4cf7af8961f71f979e1806745e80dcc2fb1f7d4c9e3f806f3a0b5b54bebc28ac3f3f401379
-
SSDEEP
6144:xl0n6auUe3vwFcSoQXn0s6XQbm90pmrtV:on6aul4Fzn0DAbdIt
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2692 u.dll 2660 mpress.exe 2904 u.dll 2044 mpress.exe -
Loads dropped DLL 8 IoCs
pid Process 2824 cmd.exe 2824 cmd.exe 2692 u.dll 2692 u.dll 2824 cmd.exe 2824 cmd.exe 2904 u.dll 2904 u.dll -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2824 2120 53c255f14b5e6cee23ad734ac8fcd23c.exe 29 PID 2120 wrote to memory of 2824 2120 53c255f14b5e6cee23ad734ac8fcd23c.exe 29 PID 2120 wrote to memory of 2824 2120 53c255f14b5e6cee23ad734ac8fcd23c.exe 29 PID 2120 wrote to memory of 2824 2120 53c255f14b5e6cee23ad734ac8fcd23c.exe 29 PID 2824 wrote to memory of 2692 2824 cmd.exe 30 PID 2824 wrote to memory of 2692 2824 cmd.exe 30 PID 2824 wrote to memory of 2692 2824 cmd.exe 30 PID 2824 wrote to memory of 2692 2824 cmd.exe 30 PID 2692 wrote to memory of 2660 2692 u.dll 34 PID 2692 wrote to memory of 2660 2692 u.dll 34 PID 2692 wrote to memory of 2660 2692 u.dll 34 PID 2692 wrote to memory of 2660 2692 u.dll 34 PID 2824 wrote to memory of 2904 2824 cmd.exe 33 PID 2824 wrote to memory of 2904 2824 cmd.exe 33 PID 2824 wrote to memory of 2904 2824 cmd.exe 33 PID 2824 wrote to memory of 2904 2824 cmd.exe 33 PID 2904 wrote to memory of 2044 2904 u.dll 31 PID 2904 wrote to memory of 2044 2904 u.dll 31 PID 2904 wrote to memory of 2044 2904 u.dll 31 PID 2904 wrote to memory of 2044 2904 u.dll 31 PID 2824 wrote to memory of 2144 2824 cmd.exe 32 PID 2824 wrote to memory of 2144 2824 cmd.exe 32 PID 2824 wrote to memory of 2144 2824 cmd.exe 32 PID 2824 wrote to memory of 2144 2824 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\53c255f14b5e6cee23ad734ac8fcd23c.exe"C:\Users\Admin\AppData\Local\Temp\53c255f14b5e6cee23ad734ac8fcd23c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1333.tmp\vir.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 53c255f14b5e6cee23ad734ac8fcd23c.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\13B0.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\13B0.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe13B1.tmp"4⤵
- Executes dropped EXE
PID:2660
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2904
-
-
-
C:\Users\Admin\AppData\Local\Temp\146B.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\146B.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe146C.tmp"1⤵
- Executes dropped EXE
PID:2044
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b89ee5bc7c2504a1cc8ba3735b4912d4
SHA19114e5c897433e6947350b5849109b2b6463f1cb
SHA256a107fb81b5705f466239de181c1800425d3e030475b8602bb93f7b1a3d4d826c
SHA5125f9bb08598ec3066b2c3038953a9d75b0492ffd4e4a62306b5e2a8de9225bfa85f03339eb40a3b846e5e5ffd1804eb032b2161ae2b279691e014ba19b4615fde
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
41KB
MD57aa367dca7be65e07b16bd69f06263e3
SHA1d447739251408f8e8490a9d307927bfbe41737ce
SHA256738bf50547320b0683af727ad6d430f2e7b83c846fe24f91527b7ee263bfa076
SHA512d7884589d7d12a628c9e07b77b3b793fa91f67fe13563e7b072ca864e053e6b7d711852e30ae1c877576b8ad47f67d2826e8ee711e6b65a329baa57492fe31b3
-
Filesize
24KB
MD57cda353434725a4a3712954fd3ded290
SHA1d8348e79d6bcee527743b126026367d700ddb436
SHA2567e781837fa89a8ead0a14c14a7f2125a89bb7b33d2ccc358f6b8ad22924b5e86
SHA5124ac257fe8e0772adc8aa1a2626153c473554c341c025959dd994100c43e2cec274e8a532e0c1b5c0ecdf463733d25a63767b995b731ce272b1c7a3ad0820b95d
-
Filesize
700KB
MD53c9568b0d86a865f9f73d9c0967cfdad
SHA13270df3e0e600f4df2c3cbc384837693a8a3a83e
SHA256c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6
SHA512bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f
-
Filesize
1KB
MD5e34c584f5ac2dea647c48aece7de9565
SHA1be6db3d694803c908afcc386375e345a539bd180
SHA256b170d9da4b6e0942c4c4beb02ca7c8e9b68742e32d11dd830f28e844dd9e4bcb
SHA512040ed1ab2603054c64d8c119e8d6c2789a85356dc961e85d51fc4daf506cb6485226aa88ad74cb444ce9c9d3e8c34052dea0a8489db4dbfef47009637cab3473
-
Filesize
92KB
MD5ace4bef1eaa126302be21c4105cc6ea3
SHA1227744c90647355a13c84178f9fedac3f75fdb97
SHA2568a675772564f80e1e7c4e51cbb64e1ba19990a010b112abc5f050100a6765c66
SHA512b4909dc9aabd8f478717a08e14648bc131b6176ac794991bd174f61dff9c3d15b0635352cce622e8088515fafbc447dd15717b3c2001ba34f86a19ba2abc4029