Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
b6f6cd34d3b07ec6f2a42c100b9fbc37.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b6f6cd34d3b07ec6f2a42c100b9fbc37.exe
Resource
win10v2004-20240226-en
General
-
Target
b6f6cd34d3b07ec6f2a42c100b9fbc37.exe
-
Size
1.1MB
-
MD5
b6f6cd34d3b07ec6f2a42c100b9fbc37
-
SHA1
cd330dcac42bfdd993267d35cb5f5084eb57d3bb
-
SHA256
f97d64216848a25ca49c460158148a63bcb2e1a360748ad4f73ec6c595316140
-
SHA512
4bd27d95a2e104635cb84d9c8c2abccf1b1799a42801c9e6604d9c37098d05a9c84b59a529f14bd4b2538c63e8651f7a6611305844652325f6cd8a1b0d792d9e
-
SSDEEP
24576:+fOykA8OkSAfEjluwVvbOtEIAJcxunlcu5q4pSWBTKxTQWVhL:+Gu83fk1VDOthUuOqKSWB2xTtL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2904 is-1V184.tmp -
Loads dropped DLL 3 IoCs
pid Process 1940 b6f6cd34d3b07ec6f2a42c100b9fbc37.exe 2904 is-1V184.tmp 2904 is-1V184.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2904 is-1V184.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2904 1940 b6f6cd34d3b07ec6f2a42c100b9fbc37.exe 28 PID 1940 wrote to memory of 2904 1940 b6f6cd34d3b07ec6f2a42c100b9fbc37.exe 28 PID 1940 wrote to memory of 2904 1940 b6f6cd34d3b07ec6f2a42c100b9fbc37.exe 28 PID 1940 wrote to memory of 2904 1940 b6f6cd34d3b07ec6f2a42c100b9fbc37.exe 28 PID 1940 wrote to memory of 2904 1940 b6f6cd34d3b07ec6f2a42c100b9fbc37.exe 28 PID 1940 wrote to memory of 2904 1940 b6f6cd34d3b07ec6f2a42c100b9fbc37.exe 28 PID 1940 wrote to memory of 2904 1940 b6f6cd34d3b07ec6f2a42c100b9fbc37.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6f6cd34d3b07ec6f2a42c100b9fbc37.exe"C:\Users\Admin\AppData\Local\Temp\b6f6cd34d3b07ec6f2a42c100b9fbc37.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\is-ENK9G.tmp\is-1V184.tmp"C:\Users\Admin\AppData\Local\Temp\is-ENK9G.tmp\is-1V184.tmp" /SL4 $40146 "C:\Users\Admin\AppData\Local\Temp\b6f6cd34d3b07ec6f2a42c100b9fbc37.exe" 892206 747522⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5c6d42e38dec79ab32c00ce9b3d790d17
SHA169ad8d14a15b1e54325d49124c3328caa27c4b7e
SHA25661d7d70b92fbc96a8cd935b45546624be4f4fa9751474ef69d30435de4bf479b
SHA5128371c46f3bb4dd7d9633ee1a34d002450654a9271b395c632d83e9056956a4e463cb230d8d28203fbe88fa44c2bb265205b74b4cdd14a9d94d1f2cf8627a92dd
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
679KB
MD5ab914322fa0a88c9233d1d6ba25a378a
SHA124f60405d73ad2a305cc5583a748cb397fe24d46
SHA25636be221923f25b232fcadfa274f6ace34a75f0214b2b607ff931095d61a9eb9e
SHA512954d255a6ee350b5a0a39dd29f720923a50209e28f4ed2c3965ad7535d7968e01c48b324b3cd88c6499067a907e483a9e7bbc2911c7fd5254cea57155d85f976