Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 09:43
Static task
static1
Behavioral task
behavioral1
Sample
9b58be9bb4a7ad40e9566bf2dc0b00a4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b58be9bb4a7ad40e9566bf2dc0b00a4.exe
Resource
win10v2004-20231215-en
General
-
Target
9b58be9bb4a7ad40e9566bf2dc0b00a4.exe
-
Size
56KB
-
MD5
9b58be9bb4a7ad40e9566bf2dc0b00a4
-
SHA1
ba06ead2c310dcf42368c035bf27dbdb48c22c82
-
SHA256
2c4c47c5c1897a7e44603d80df4d9b0fca0fc014207a7b2a5aac17b32e83266d
-
SHA512
cd85ebf7f8e8707a71b359a13c8d318695eb7595ff9f43ac7256100773e628a17bc575feca61710e4bf7b846ff99c4a8aeecdf1523c5cf5f34492d5dd83e73c3
-
SSDEEP
768:8yIqMQHieHFLWEvA4Lbrl1rvs52bpdu5DjtZj06W62s9O9nCbpv46l61:7IqMQlHtfvrbp1fbTu5DjA+9k24V
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\N: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\M: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\K: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\Y: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\P: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\L: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\Z: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\S: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\R: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\O: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\I: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\G: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\V: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\W: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\U: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\T: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\J: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\H: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\E: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\X: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3048 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3048 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3048 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3048 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3048 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3048 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3048 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3048 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3048 wrote to memory of 1244 3048 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 11 PID 3048 wrote to memory of 1244 3048 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\9b58be9bb4a7ad40e9566bf2dc0b00a4.exe"C:\Users\Admin\AppData\Local\Temp\9b58be9bb4a7ad40e9566bf2dc0b00a4.exe"2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048
-