Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 01:50
Behavioral task
behavioral1
Sample
31ed1cda395acd7022235a65002c4cf7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31ed1cda395acd7022235a65002c4cf7.exe
Resource
win10v2004-20240226-en
General
-
Target
31ed1cda395acd7022235a65002c4cf7.exe
-
Size
116KB
-
MD5
31ed1cda395acd7022235a65002c4cf7
-
SHA1
f3b0c1025cebb7d567c8f6f166aada43215976a2
-
SHA256
18a1a90e634f769a353d47bf4caf9f4111101866126c2c5ec34f1f00365e308b
-
SHA512
166dc940e1a068941af7841c90b356cf0f9bcf21c9a67c56229a808848a772ab5aef90cf561724f323957101f4fc06c2b22e376f0b59115aee543933c58a3d28
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNLX9R:T6a+rdOOtEvwDpjLz9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3008 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1380 31ed1cda395acd7022235a65002c4cf7.exe -
resource yara_rule behavioral1/memory/1380-1-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1380-14-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000900000001227e-11.dat upx behavioral1/memory/3008-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/3008-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1380 wrote to memory of 3008 1380 31ed1cda395acd7022235a65002c4cf7.exe 28 PID 1380 wrote to memory of 3008 1380 31ed1cda395acd7022235a65002c4cf7.exe 28 PID 1380 wrote to memory of 3008 1380 31ed1cda395acd7022235a65002c4cf7.exe 28 PID 1380 wrote to memory of 3008 1380 31ed1cda395acd7022235a65002c4cf7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\31ed1cda395acd7022235a65002c4cf7.exe"C:\Users\Admin\AppData\Local\Temp\31ed1cda395acd7022235a65002c4cf7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD51c02c031d55539f19e346e1f3f702cae
SHA1b91f82dfc58bb9981c48d1b4b041ae69279d6df7
SHA25672143b383014c5ba81d906ff40297684252ae766542437105db45dfafed91a9a
SHA512a5c66ee0253fd00e4be8d5d55e26a390c4978dd90d288f5871ca1d75860e52397056197f6f38d419bd71dd603928ead87ddb64183cfedd526ec872c602d6c84a