Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 06:42
Behavioral task
behavioral1
Sample
66f3eeb56322cede0f368e3aaf306978.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
66f3eeb56322cede0f368e3aaf306978.exe
Resource
win10v2004-20231215-en
General
-
Target
66f3eeb56322cede0f368e3aaf306978.exe
-
Size
836KB
-
MD5
66f3eeb56322cede0f368e3aaf306978
-
SHA1
bf2e572aa626c4012ebcc875e786ead51b4db2cb
-
SHA256
e5b2ac088183aa590042502bd0a128878310654524550baf93ec8df66a6bde1b
-
SHA512
85f281daebd8d370e1e4a1c563515cd76c09b54eb5cfa6665a9760e486efb0cc44b744acd28bf67884afa78faaa5c3fef0bea2915829cfcca6018495b0eff7d6
-
SSDEEP
12288:KjkArEN249AyE/rbaMct4bO2/VEYPAAZOlOpqlCLwNdu58aVK/ntH0uYZY91Bp:NFE//Tct4bOsB4sjpqlwkdfMmSY7Bp
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2268 66f3eeb56322cede0f368e3aaf306978.exe -
resource yara_rule behavioral1/memory/2268-0-0x0000000000400000-0x00000000004D5000-memory.dmp upx behavioral1/memory/2268-44-0x0000000000400000-0x00000000004D5000-memory.dmp upx behavioral1/memory/2268-45-0x0000000000400000-0x00000000004D5000-memory.dmp upx -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2268-44-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe behavioral1/memory/2268-45-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2268 66f3eeb56322cede0f368e3aaf306978.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a7ac2541237ed49a192e91522103ed4c
SHA1c0be672bfe10cd94859fcac0d45c39868c088fcd
SHA2562b73b0bda7c7e49627a97eb5eb255fed423f7e0dab385f57eabf44a381207a47
SHA5126b8aef7bf734d81de3b968a1950c5038d3dfb820c40506c86bea171369e3292a1dd9a3e884c190d6426483e9f2a85cbd18d81f46339270512a8472418a5289d2