Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
e2427555fce119fb4dc42eca0e555280.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2427555fce119fb4dc42eca0e555280.exe
Resource
win10v2004-20240226-en
General
-
Target
e2427555fce119fb4dc42eca0e555280.exe
-
Size
3.6MB
-
MD5
e2427555fce119fb4dc42eca0e555280
-
SHA1
96e261c7a9a365b986cd0640568626aa03822f6e
-
SHA256
945830220e26b7d6c036ab040642f3f06031f5ec67e228ac6d405d031e92e262
-
SHA512
e619d02b9e83e4f557db34f1d26174bfe836a6b2dc4cc362b7a922f60f9eccb2a9101f9fe9c1c263474a4e5997a31b8bd39c0e67e789a2b6c2691241845cde43
-
SSDEEP
98304:4TQvh7n/AxjrqGK7nYAmKUIMADGpnzOGKzt/Hni:d7n/AYYiU5ADG9Cd/Hni
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2940 e2427555fce119fb4dc42eca0e555280.tmp -
Loads dropped DLL 3 IoCs
pid Process 2072 e2427555fce119fb4dc42eca0e555280.exe 2940 e2427555fce119fb4dc42eca0e555280.tmp 2940 e2427555fce119fb4dc42eca0e555280.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2940 e2427555fce119fb4dc42eca0e555280.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2940 2072 e2427555fce119fb4dc42eca0e555280.exe 28 PID 2072 wrote to memory of 2940 2072 e2427555fce119fb4dc42eca0e555280.exe 28 PID 2072 wrote to memory of 2940 2072 e2427555fce119fb4dc42eca0e555280.exe 28 PID 2072 wrote to memory of 2940 2072 e2427555fce119fb4dc42eca0e555280.exe 28 PID 2072 wrote to memory of 2940 2072 e2427555fce119fb4dc42eca0e555280.exe 28 PID 2072 wrote to memory of 2940 2072 e2427555fce119fb4dc42eca0e555280.exe 28 PID 2072 wrote to memory of 2940 2072 e2427555fce119fb4dc42eca0e555280.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2427555fce119fb4dc42eca0e555280.exe"C:\Users\Admin\AppData\Local\Temp\e2427555fce119fb4dc42eca0e555280.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\is-QHLFE.tmp\e2427555fce119fb4dc42eca0e555280.tmp"C:\Users\Admin\AppData\Local\Temp\is-QHLFE.tmp\e2427555fce119fb4dc42eca0e555280.tmp" /SL5="$30156,3567194,53248,C:\Users\Admin\AppData\Local\Temp\e2427555fce119fb4dc42eca0e555280.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
671KB
MD5acec08a952e0b9a24afe1f95bb335e11
SHA1edd75d5928d96c0eddae2fc88bc52787357acc46
SHA25652976fc5d14c217b0b50f4c95e81cd82494430035d15bbcd586303f6b5f63b44
SHA51293b3a2964857e0cb3ef4425a33279b16f7a914d1ce585406141f81680ce9a469f41c4199cfc3acaf0246a4d978dcbf22bfa68978217054c9b04b93b8280716a7