Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
bc37b3ee1a472909dba1a431a4b04ec2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bc37b3ee1a472909dba1a431a4b04ec2.exe
Resource
win10v2004-20240226-en
General
-
Target
bc37b3ee1a472909dba1a431a4b04ec2.exe
-
Size
285KB
-
MD5
bc37b3ee1a472909dba1a431a4b04ec2
-
SHA1
b5fb80e3a838275ca91a3df36360adb7a71b1337
-
SHA256
23c89e579e975b5ba46b819041c75db726d767856b368a00fc4f02449926568c
-
SHA512
b88f47cfece75a00fb04445b682effd30eabc26e88ea3041a9fe4404c647a7c00b0d9c43a22cb916bd0f743dc6591e4c29f0068db06f07e18c40c68a2fc3858f
-
SSDEEP
6144:NGC7W7BU5nMqKGqcUz9PbMpbLnTs8rejIaYrc5RjQjcvFTMlWXKYR:fa7gMqKGqP9DMpbLnTfaSc5HTMlWXK
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2728 lzma.exe 2632 lzma.exe 2056 bc37b3ee1a472909dba1a431a4b04ec2.exe -
Loads dropped DLL 19 IoCs
pid Process 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 2728 lzma.exe 2728 lzma.exe 2728 lzma.exe 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 2632 lzma.exe 2632 lzma.exe 2632 lzma.exe 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 2056 bc37b3ee1a472909dba1a431a4b04ec2.exe 2056 bc37b3ee1a472909dba1a431a4b04ec2.exe 2056 bc37b3ee1a472909dba1a431a4b04ec2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2056 bc37b3ee1a472909dba1a431a4b04ec2.exe 2056 bc37b3ee1a472909dba1a431a4b04ec2.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2728 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 28 PID 2044 wrote to memory of 2728 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 28 PID 2044 wrote to memory of 2728 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 28 PID 2044 wrote to memory of 2728 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 28 PID 2044 wrote to memory of 2728 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 28 PID 2044 wrote to memory of 2728 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 28 PID 2044 wrote to memory of 2728 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 28 PID 2044 wrote to memory of 2632 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 30 PID 2044 wrote to memory of 2632 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 30 PID 2044 wrote to memory of 2632 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 30 PID 2044 wrote to memory of 2632 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 30 PID 2044 wrote to memory of 2632 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 30 PID 2044 wrote to memory of 2632 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 30 PID 2044 wrote to memory of 2632 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 30 PID 2044 wrote to memory of 2056 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 32 PID 2044 wrote to memory of 2056 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 32 PID 2044 wrote to memory of 2056 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 32 PID 2044 wrote to memory of 2056 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 32 PID 2044 wrote to memory of 2056 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 32 PID 2044 wrote to memory of 2056 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 32 PID 2044 wrote to memory of 2056 2044 bc37b3ee1a472909dba1a431a4b04ec2.exe 32 PID 2056 wrote to memory of 2616 2056 bc37b3ee1a472909dba1a431a4b04ec2.exe 33 PID 2056 wrote to memory of 2616 2056 bc37b3ee1a472909dba1a431a4b04ec2.exe 33 PID 2056 wrote to memory of 2616 2056 bc37b3ee1a472909dba1a431a4b04ec2.exe 33 PID 2056 wrote to memory of 2616 2056 bc37b3ee1a472909dba1a431a4b04ec2.exe 33 PID 2056 wrote to memory of 2616 2056 bc37b3ee1a472909dba1a431a4b04ec2.exe 33 PID 2056 wrote to memory of 2616 2056 bc37b3ee1a472909dba1a431a4b04ec2.exe 33 PID 2056 wrote to memory of 2616 2056 bc37b3ee1a472909dba1a431a4b04ec2.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc37b3ee1a472909dba1a431a4b04ec2.exe"C:\Users\Admin\AppData\Local\Temp\bc37b3ee1a472909dba1a431a4b04ec2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\nsy12B7.tmp\lzma.exe"C:\Users\Admin\AppData\Local\Temp\nsy12B7.tmp\lzma.exe" "d" "C:\Users\Admin\AppData\Local\Temp\nsy12B7.tmp\i1hqkyLh.dat" "C:\Users\Admin\AppData\Local\Temp\nso12C8.tmp\pcftl3ciAQ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\nsy12B7.tmp\lzma.exe"C:\Users\Admin\AppData\Local\Temp\nsy12B7.tmp\lzma.exe" "d" "C:\Users\Admin\AppData\Local\Temp\nsy12B7.tmp\q2gyEFqq.dat" "C:\Users\Admin\AppData\Local\Temp\nso12C8.tmp\CommonsDll.dll"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\nso12C8.tmp\bc37b3ee1a472909dba1a431a4b04ec2.exe"C:\Users\Admin\AppData\Local\Temp\nso12C8.tmp\bc37b3ee1a472909dba1a431a4b04ec2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"3⤵PID:2616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD556d1646a9d660c665714305a98289b44
SHA1f5df0e879f63bbc6f42d13505d65f00be4396be6
SHA25678ec302df29d2393c233a9bf301f1536c51b8279ee9166ceda4f9efaca18c240
SHA5125bb580ab2fa43ccbfe28d32d04e0d2083f2fddf69f089c7b697012579b21cd2b37ab7fde4179da67cf6680ecbe8b1a5165d26201bc66e558a23f3d24d280ac3e
-
Filesize
127KB
MD5fd83c01a43b8f823606f101a797b5778
SHA1dabdae3877e598573466a36e5fd9a020f383579d
SHA256f6e76fe07adc8eacd1082f36dc7e00e47ba21778ea418fea9d5cfaf9d982296c
SHA5120552ecc34d9dfddae32c67cd8fb021156f7ac9a0e24fe28f4e6a8a89f7ad2c22f5592ca5ac5cb1432cf7421bcf35d13ae8f511c1759bc1362bd6bddc2bc02910
-
Filesize
20KB
MD5e810d7dc991017445073bba89813870a
SHA1dd7e64d1a047c0af071a906e560c7ca41c0b94ae
SHA256dbe194f5075b8efcb4acfadac4785ef7a992748c7a33b52b54f5c38cbd7925c0
SHA512ccd2f69918cf6782d501629ee52ac38207b32fd6189c42bcd0481d8f0b283d77b159235249176054dd583cdb609339c9bd810c7f74e01f62c02bade32bab7708
-
Filesize
57KB
MD5768355f76dfe9c82cdf580bd6d9de87c
SHA16d09e2ab9334ff34ca0c7885e37aba37d76bb6f6
SHA256906f2aed50e450015621f70a537d5229bb5d9d34da770ebc0d5375258cc93046
SHA5129d09d43fa8ffabe58b4bd788decf21012fcfcd90ff6f7305a1ad385c171a92f9618cfb1586e3ace946c7cb9d302fc9b227700679d701b83eb2e02fb7ee8e6b25
-
Filesize
108KB
MD507eb363b2e639c3da8f85f5a5cf04e35
SHA1c046cca5b63cef1246f10c65516fdedccebf11ba
SHA256b70ea3ff5887d09f7c8476cdf5186ce434a56bc561e5a43dab97fea6af50f69d
SHA512d06051d07407496f95a898bb6d3e5af8ecfa8215b05bb1d5149a48be2a161a17770dc007bc26b9640f8bd8a8cd11efb0c87db530109dc4f7a8bd67668e1894be
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
Filesize
131KB
MD538966a0e2d88da4cc4a39a83461c338f
SHA1f4d7d0440cf3ca6048f0f2e90501593629a25098
SHA2568457ac5138561c2ac4bdc88be2caccb4ac023a4ac28fa2a34b21e501aae704e0
SHA512bc7e6e67c077b21c310d8f8579ba737dbee0a51aadefd7478289259a5a644dca29f5f30624e531e9e85a439ba84bfab5f26fa4632cf75164567f9a0f5475c55f
-
Filesize
6KB
MD5fa299e199922b3ba833be655a8d71b75
SHA14d74c53bb6927a2831df93af26f3e4e4fb007797
SHA25649a6a1c1f19574b2a247ce6c5adc0751e046d27c30912816ba415f871b74ae5d
SHA5127ceb64d3d826762994c48ffad3ad2234410cbcdbedfce9a2dc03d18915ce22d687173f90e954d7bdb0eae76954c360059ad761aedc48cd7fa4ec29d6094f6a65