Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
8d83368e27aeb1713f73571137175372.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d83368e27aeb1713f73571137175372.exe
Resource
win10v2004-20231215-en
General
-
Target
8d83368e27aeb1713f73571137175372.exe
-
Size
3.4MB
-
MD5
8d83368e27aeb1713f73571137175372
-
SHA1
5982ca558e2908efe2d4e0f90258a8f51b832c9e
-
SHA256
842e2f289935c92dae5c4435973257202bfc720be0f393dab61db7120d98900c
-
SHA512
bc7c9eb991fdae2112cf96139b1979dc28b9d72913ba115def074fdaf3e4831115523bb7b7c954d235bd378897739151bc8ff377f6c3bf932dc60431362611c8
-
SSDEEP
49152:cN2ICGPZ/TO7pZLDvNNEXajLYSn/OXQdoHnH0irzC9oaSCbVq5Ij4k9P0hdHb9eR:cN2PSULDvNESyQmHHDTDQsIcOXHl/
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yDJQK0Iv0NrdhqHw.exe 8d83368e27aeb1713f73571137175372.exe -
Executes dropped EXE 2 IoCs
pid Process 2084 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe -
Loads dropped DLL 3 IoCs
pid Process 2756 8d83368e27aeb1713f73571137175372.exe 2756 8d83368e27aeb1713f73571137175372.exe 2084 yDJQK0Iv0NrdhqHw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1824 3044 WerFault.exe 32 -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 2604 yDJQK0Iv0NrdhqHw.exe 3044 cmd.exe 3044 cmd.exe 3044 cmd.exe 3044 cmd.exe 3044 cmd.exe 3044 cmd.exe 3044 cmd.exe 3044 cmd.exe 3044 cmd.exe 3044 cmd.exe 3044 cmd.exe 3044 cmd.exe 3044 cmd.exe 3044 cmd.exe 3044 cmd.exe 3044 cmd.exe 3044 cmd.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2756 2896 8d83368e27aeb1713f73571137175372.exe 15 PID 2896 wrote to memory of 2756 2896 8d83368e27aeb1713f73571137175372.exe 15 PID 2896 wrote to memory of 2756 2896 8d83368e27aeb1713f73571137175372.exe 15 PID 2896 wrote to memory of 2756 2896 8d83368e27aeb1713f73571137175372.exe 15 PID 2756 wrote to memory of 2084 2756 8d83368e27aeb1713f73571137175372.exe 31 PID 2756 wrote to memory of 2084 2756 8d83368e27aeb1713f73571137175372.exe 31 PID 2756 wrote to memory of 2084 2756 8d83368e27aeb1713f73571137175372.exe 31 PID 2756 wrote to memory of 2084 2756 8d83368e27aeb1713f73571137175372.exe 31 PID 2084 wrote to memory of 2604 2084 yDJQK0Iv0NrdhqHw.exe 30 PID 2084 wrote to memory of 2604 2084 yDJQK0Iv0NrdhqHw.exe 30 PID 2084 wrote to memory of 2604 2084 yDJQK0Iv0NrdhqHw.exe 30 PID 2084 wrote to memory of 2604 2084 yDJQK0Iv0NrdhqHw.exe 30 PID 2604 wrote to memory of 3044 2604 yDJQK0Iv0NrdhqHw.exe 32 PID 2604 wrote to memory of 3044 2604 yDJQK0Iv0NrdhqHw.exe 32 PID 2604 wrote to memory of 3044 2604 yDJQK0Iv0NrdhqHw.exe 32 PID 2604 wrote to memory of 3044 2604 yDJQK0Iv0NrdhqHw.exe 32 PID 2604 wrote to memory of 3044 2604 yDJQK0Iv0NrdhqHw.exe 32 PID 2604 wrote to memory of 3044 2604 yDJQK0Iv0NrdhqHw.exe 32 PID 3044 wrote to memory of 1824 3044 cmd.exe 34 PID 3044 wrote to memory of 1824 3044 cmd.exe 34 PID 3044 wrote to memory of 1824 3044 cmd.exe 34 PID 3044 wrote to memory of 1824 3044 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d83368e27aeb1713f73571137175372.exe"C:\Users\Admin\AppData\Local\Temp\8d83368e27aeb1713f73571137175372.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yDJQK0Iv0NrdhqHw.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yDJQK0Iv0NrdhqHw.exe" "C:\Users\Admin\AppData\Local\Temp\8d83368e27aeb1713f73571137175372.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\8d83368e27aeb1713f73571137175372.exe"C:\Users\Admin\AppData\Local\Temp\8d83368e27aeb1713f73571137175372.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2896
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yDJQK0Iv0NrdhqHw.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yDJQK0Iv0NrdhqHw.exe" "C:\Users\Admin\AppData\Local\Temp\8d83368e27aeb1713f73571137175372.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 2843⤵
- Program crash
PID:1824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
775KB
MD533e99e6ffcfeb89674695e4dd91708ab
SHA197b0851266f75dfc216333e09b6b0dce7d42f444
SHA25638b5ee5322b03668a8d46b207c804b9551ab4d3a194ffaf4bfeb28eba0799129
SHA5128b536da6ea66403247aa88356ad9c46ab7d7450dcf047ac80a408e849625cb1cef02cfd24027e2836132b74b9cb3b5271df937cf11abd672272934f2b888d5ff
-
Filesize
719KB
MD5c24cf977fd00adb57c659d1e47f9012f
SHA15565cfdff367579a3573f2ac8622ef7a5d1a36d4
SHA256b28db746760209e0b2498a4056d8c12f3d5f839d19b1f4135e4ec0aa3714c1bc
SHA5126834f6565022cda653bcbf85a2c697925974b0fc03d6f268ec0d206500d68fcf52c674c338385ab135ddc8257b1e50ac714048a14e59daec79a6f5b19f4b11de
-
Filesize
529KB
MD55cb08beb446508117a13ce84237e453a
SHA1c16db1e0656f888823922403c7b91e3a8cc653f7
SHA256f2da106105c32ab017ce4ab95585c3dc0d488ff7fbbf7daa6b84dd9ac335cb8c
SHA512426ee4ffc599e51956c3ce78bd1baf3dcb47fd5922dae2aa26930edf3d46ee2f2cb91eba1b21a8a8f5cc79874547146dd8d25058e14538fbb7e0c4757aba8e54
-
Filesize
585KB
MD5b4a392d9f4ccc3ad85554cdeecaf422b
SHA1bca3895370f0e74267d95ff045e31d6aef408d8a
SHA25607ecc2ad22aa1c40048e30267e79999153a471bcf0e8c65650999ee7946db644
SHA5123d0e5e430b42850c56e50aef141ada59217eedfe348491deb98cb8e497a0c80a6d87652c70e4cb567dfdcba8ca0f3fa97c99371fa01d768036582c0ee6a4095c
-
Filesize
556KB
MD53ea893ae9d0ae5bfd2df834115f2c6ad
SHA16a7c8cbfae453039259796865ba75b7e495e69f9
SHA2562e7b27343ddb9b64ced3a851dd1bc07d12d41e0ad344edf14016d067d8aae94b
SHA512b3f507e28487bc23e618af28b0d14a80c8b8acce0ef32b865e1eeea13055ad8f6ef281d8b83021747ffd48c0188c735950d50a5bb754b876fb10d1d7c7b97a1e
-
Filesize
825KB
MD524d57fe2583a1f2269ac51ff2d475c6b
SHA1b9c6fdb2b5f430a5aa5108ce3cf8aca6a5d78a10
SHA25621874fd4a97ba279b2d67ce1267632d934177a2064b734d1ea897b435092a3de
SHA512e57ac82e20cb6b4694c0820b4f70cdd4d252ff5400da25f448d2cbbe03b3ac5c2f532ea9343238eb8f3a9f81475aff018f8bbddea35069b84a5646de8c82079d
-
Filesize
798KB
MD5592e09dd8a8919d8cf768a7584856fa6
SHA1c967bca6240bbe41ae2593b1b76de49434cb987d
SHA256a0ad9b133571ee1e4120fcd7c592551bd87668541d9c64c8772708a19e10d023
SHA5123b399054594cddba1514051cbe7d4784cc8204dadde7b96a8420cd70bafe49da485f06ff7990a99f6f258bd2987fd6a6cc6fbf40c992e6bec559f8b194f562fc