Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/03/2024, 00:23
Behavioral task
behavioral1
Sample
c32edbfbfe44d82a49a386a28b9116ed2df4be2ebad3750b7d64cb2bd00dca4c.exe
Resource
win7-20240221-en
General
-
Target
c32edbfbfe44d82a49a386a28b9116ed2df4be2ebad3750b7d64cb2bd00dca4c.exe
-
Size
422KB
-
MD5
e41a7d87cf5e5af616c4d7f9413d26f0
-
SHA1
6bf09e6e60b144977d346439cf215c4bea40b510
-
SHA256
c32edbfbfe44d82a49a386a28b9116ed2df4be2ebad3750b7d64cb2bd00dca4c
-
SHA512
21b5864632119ae429484b9e7fa3ba75fc0d4354fe99b404118d7a7f0ff5379664299b729d27de7edd35334604e3bfa1e2c97eec8303c0a05b2c6a43dff6d8fc
-
SSDEEP
6144:kzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOYqI:eU7M5ijWh0XOW4sEfeObI
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
resource yara_rule behavioral1/files/0x000900000000f6f2-26.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2508 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2980 kupof.exe 1632 loade.exe -
Loads dropped DLL 3 IoCs
pid Process 2208 c32edbfbfe44d82a49a386a28b9116ed2df4be2ebad3750b7d64cb2bd00dca4c.exe 2208 c32edbfbfe44d82a49a386a28b9116ed2df4be2ebad3750b7d64cb2bd00dca4c.exe 2980 kupof.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe 1632 loade.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2980 2208 c32edbfbfe44d82a49a386a28b9116ed2df4be2ebad3750b7d64cb2bd00dca4c.exe 28 PID 2208 wrote to memory of 2980 2208 c32edbfbfe44d82a49a386a28b9116ed2df4be2ebad3750b7d64cb2bd00dca4c.exe 28 PID 2208 wrote to memory of 2980 2208 c32edbfbfe44d82a49a386a28b9116ed2df4be2ebad3750b7d64cb2bd00dca4c.exe 28 PID 2208 wrote to memory of 2980 2208 c32edbfbfe44d82a49a386a28b9116ed2df4be2ebad3750b7d64cb2bd00dca4c.exe 28 PID 2208 wrote to memory of 2508 2208 c32edbfbfe44d82a49a386a28b9116ed2df4be2ebad3750b7d64cb2bd00dca4c.exe 29 PID 2208 wrote to memory of 2508 2208 c32edbfbfe44d82a49a386a28b9116ed2df4be2ebad3750b7d64cb2bd00dca4c.exe 29 PID 2208 wrote to memory of 2508 2208 c32edbfbfe44d82a49a386a28b9116ed2df4be2ebad3750b7d64cb2bd00dca4c.exe 29 PID 2208 wrote to memory of 2508 2208 c32edbfbfe44d82a49a386a28b9116ed2df4be2ebad3750b7d64cb2bd00dca4c.exe 29 PID 2980 wrote to memory of 1632 2980 kupof.exe 33 PID 2980 wrote to memory of 1632 2980 kupof.exe 33 PID 2980 wrote to memory of 1632 2980 kupof.exe 33 PID 2980 wrote to memory of 1632 2980 kupof.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c32edbfbfe44d82a49a386a28b9116ed2df4be2ebad3750b7d64cb2bd00dca4c.exe"C:\Users\Admin\AppData\Local\Temp\c32edbfbfe44d82a49a386a28b9116ed2df4be2ebad3750b7d64cb2bd00dca4c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\kupof.exe"C:\Users\Admin\AppData\Local\Temp\kupof.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\loade.exe"C:\Users\Admin\AppData\Local\Temp\loade.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD50b10cd83fd8a55a75fe654db12d752ce
SHA10e4f27159346b32adb6e64b18f4128cca9dd9a17
SHA25671d35ffeb3d91026463f07dfad70192e2601d70d9028f45daf3e4e9113063dab
SHA512623b5b07298e0393125fd5fd7bf54eae05c756a72a895a0b7d537075116bd92287ff0f5e6367679feba83b1677375c5aaa16817f85e37303f37fb348b914b4f2
-
Filesize
512B
MD5feacce948641da50752e1a5ddda532b6
SHA165d59203c2795f061c99aa4cf436c1f43c33bcb9
SHA2562404a4d4e975d411748078b5a3690263b5b62cff897c60b6083f63e6c3f23cdc
SHA512dbe17dee8238fa4baa36d3bb5dc257df6bddad2fdb8a94d3917df79892aefdd91d086abe041ad71d3022f831cd731e9ac305fcfe258ad6ab876b91fbb8330d62
-
Filesize
422KB
MD589a14c3c1b8f7dfe11b21009b752daf5
SHA10769c6bc031877ed85f0f0782ff55887aee361de
SHA256ed1a74179a74b4e74e7a237143baed6da69560d9b87292dd9fa4d91cc613c1c6
SHA5121d279cb9c31e6be703678161396e562f3836d093810824efe2835b3d4dd9476c18460581a4d57816c04d989fc00245e006d8f1fea85e805a86bb0199c57cfd74
-
Filesize
212KB
MD552cdd44c07acbd9283416d948f64ea33
SHA1f4094c1f27c5fdfad782ef223a81e4dd3afcdd0a
SHA256c6eb196b4ff63104bc4d4410fd83bf51e38dec0b70a40dba267e5eece49b1b4d
SHA512fdcf85ec810594065446dc3bfdc8dec1a5b81ed9faa21e4441e001d87e168e2c5b4a4c84cc45396f00e091d70d4165c2e286269545838f1063a610ba957daec9