Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
66b4a9b9e1048b88dfd85a22f5985ccd.exe
Resource
win7-20231215-en
General
-
Target
66b4a9b9e1048b88dfd85a22f5985ccd.exe
-
Size
49KB
-
MD5
66b4a9b9e1048b88dfd85a22f5985ccd
-
SHA1
66713e0d5bacde0f1f7b1a11ada1878c3b45bc83
-
SHA256
d7ae91be36c221dcf4e8ba8d02919db653c632de1c084987e152d8e52f24e387
-
SHA512
9a06deb2973792898b67c3521d15432730e4845682fcc816f388b7b08e6b109bad523ca99ad9e245caae47c67d8ebfb2fda048c1fcf78840308bb311e79e9e39
-
SSDEEP
1536:834/PC7Ruz3hRXRASULZ6JKYdbzcmhCZny:It7R8fU6n8y
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Deletes itself 1 IoCs
pid Process 2844 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3036 mokdhft.exe -
Loads dropped DLL 1 IoCs
pid Process 1704 66b4a9b9e1048b88dfd85a22f5985ccd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1704 wrote to memory of 3036 1704 66b4a9b9e1048b88dfd85a22f5985ccd.exe 28 PID 1704 wrote to memory of 3036 1704 66b4a9b9e1048b88dfd85a22f5985ccd.exe 28 PID 1704 wrote to memory of 3036 1704 66b4a9b9e1048b88dfd85a22f5985ccd.exe 28 PID 1704 wrote to memory of 3036 1704 66b4a9b9e1048b88dfd85a22f5985ccd.exe 28 PID 1704 wrote to memory of 2844 1704 66b4a9b9e1048b88dfd85a22f5985ccd.exe 29 PID 1704 wrote to memory of 2844 1704 66b4a9b9e1048b88dfd85a22f5985ccd.exe 29 PID 1704 wrote to memory of 2844 1704 66b4a9b9e1048b88dfd85a22f5985ccd.exe 29 PID 1704 wrote to memory of 2844 1704 66b4a9b9e1048b88dfd85a22f5985ccd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\66b4a9b9e1048b88dfd85a22f5985ccd.exe"C:\Users\Admin\AppData\Local\Temp\66b4a9b9e1048b88dfd85a22f5985ccd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\mokdhft.exe"C:\Users\Admin\AppData\Local\Temp\mokdhft.exe"2⤵
- Executes dropped EXE
PID:3036
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD539e55c2b5135dd669ad371cc03d79fc2
SHA1d027fea84a269f8e556dfb5411ac3d01b9311017
SHA256ecf7b9f0150af34b1d09f4602f0acf31445ff28e40b2411b0e32180bb8672919
SHA512e75942d900b97d254097d8a44bfde16bdc99cc0f124541316a0987b2fb5433b7b1f12d4eff8b47d05e9068e7a038e4dd92998646448dcb0d6615a81a561ef280
-
Filesize
274B
MD5d30b04871154e17588f0a25f66059ba9
SHA12f84340526ff4cfaa9253feeeb6677049390bb9f
SHA2567792b1864f78b8d73374472e7603c9c5c632f7edb3e1f20b140e7887308b35b3
SHA5129bc39f3551c4f9af380e6f2144e06d1ff62519f9a6682993ffa9d5e73a60657dfae15c2cad32a60300011671ffaf11682d0ee0d01201ecb3cc86c1c727fb3e95
-
Filesize
49KB
MD5fb8e0351ce1b445294f5af396a05e570
SHA1ff6f3da6a51b2caf82493c520a7e0121cb888488
SHA256f461c40bdfa07db67ce36451796bd1417a27209ad4f74b5727d1165e10a590bc
SHA512d54c63782f7f7a958fcc947d046b67f06fbd9d3288ac301edef3dc7a55447d4e52c3fd0522b82e7614f70c68c6f4ac6d924f6b0d6b3b687fabe0f8ea98050ae9