Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 18:56
Behavioral task
behavioral1
Sample
23cae92bd27356896882641779791ffa4a62f63027b0f2a36bb2c08e04816ca5.exe
Resource
win7-20240220-en
General
-
Target
23cae92bd27356896882641779791ffa4a62f63027b0f2a36bb2c08e04816ca5.exe
-
Size
125KB
-
MD5
e9643d13888c52f4a10e634f78598cb3
-
SHA1
91c7e770b1a6f591c6c34fb5b36faa71c890e361
-
SHA256
23cae92bd27356896882641779791ffa4a62f63027b0f2a36bb2c08e04816ca5
-
SHA512
3b73426292f0a2b53d22369066ed58cf063585ed2f9bf0ebedf205d424dc69119f82fd698ff9e6b39f11fa478373b5ce24f567cf9c7ad6a53ec94c5d04152b7d
-
SSDEEP
1536:Ko6JdvxttIBcXISDPV2Mhg3GkFceersWjcd06UsfqW2vxq6UU/Hp1:iHC6D92O8n7eU06UsfUpqCb
Malware Config
Extracted
urelas
112.175.88.209
112.175.88.207
112.175.88.208
Signatures
-
Deletes itself 1 IoCs
pid Process 2536 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2248 biudfw.exe -
Loads dropped DLL 1 IoCs
pid Process 2208 23cae92bd27356896882641779791ffa4a62f63027b0f2a36bb2c08e04816ca5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2248 2208 23cae92bd27356896882641779791ffa4a62f63027b0f2a36bb2c08e04816ca5.exe 28 PID 2208 wrote to memory of 2248 2208 23cae92bd27356896882641779791ffa4a62f63027b0f2a36bb2c08e04816ca5.exe 28 PID 2208 wrote to memory of 2248 2208 23cae92bd27356896882641779791ffa4a62f63027b0f2a36bb2c08e04816ca5.exe 28 PID 2208 wrote to memory of 2248 2208 23cae92bd27356896882641779791ffa4a62f63027b0f2a36bb2c08e04816ca5.exe 28 PID 2208 wrote to memory of 2536 2208 23cae92bd27356896882641779791ffa4a62f63027b0f2a36bb2c08e04816ca5.exe 29 PID 2208 wrote to memory of 2536 2208 23cae92bd27356896882641779791ffa4a62f63027b0f2a36bb2c08e04816ca5.exe 29 PID 2208 wrote to memory of 2536 2208 23cae92bd27356896882641779791ffa4a62f63027b0f2a36bb2c08e04816ca5.exe 29 PID 2208 wrote to memory of 2536 2208 23cae92bd27356896882641779791ffa4a62f63027b0f2a36bb2c08e04816ca5.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\23cae92bd27356896882641779791ffa4a62f63027b0f2a36bb2c08e04816ca5.exe"C:\Users\Admin\AppData\Local\Temp\23cae92bd27356896882641779791ffa4a62f63027b0f2a36bb2c08e04816ca5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:2248
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5d8b6fb23d659bed3f6b1cf40a104e95a
SHA107c9c74af6b0fe9b78bb1b3aed5bdc1e0b5de952
SHA256f28d96334bf66f634f899c800b4d5c6195bcf407cb073761f8a4f30a4061f136
SHA512e841cd9283c63a92395b4221492e2ae6b06d9c4108fcbbfe7d8a7928cfca405c14c0634a6388a4f18da3db611696ea797f9b825ed314d1640a17aa767593e412
-
Filesize
338B
MD55492d6664c1c33e56fbdd1f83b97aed9
SHA1a4fa1e446746dfc627467009f262217f1ec80fb6
SHA2568b8645e86a01794124b570debddb72b2072a312c3b371813a66987c725de423a
SHA512a6e6a87b60049ee0af42f61cdffbd3752a6ce323e7603d345259ef93ea09a3a0bbf83085d94cb9f0fde455081db1e40a548ca4611341422a574ed1a6a5009c6f
-
Filesize
125KB
MD5e9643d13888c52f4a10e634f78598cb3
SHA191c7e770b1a6f591c6c34fb5b36faa71c890e361
SHA25623cae92bd27356896882641779791ffa4a62f63027b0f2a36bb2c08e04816ca5
SHA5123b73426292f0a2b53d22369066ed58cf063585ed2f9bf0ebedf205d424dc69119f82fd698ff9e6b39f11fa478373b5ce24f567cf9c7ad6a53ec94c5d04152b7d