Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 05:44
Behavioral task
behavioral1
Sample
1e805c0b8a34c6295ec6e7d02c0f0539.exe
Resource
win7-20240221-en
General
-
Target
1e805c0b8a34c6295ec6e7d02c0f0539.exe
-
Size
342KB
-
MD5
1e805c0b8a34c6295ec6e7d02c0f0539
-
SHA1
79ab51cb5f5b2b4141eb1a3ec88ee45aca06d027
-
SHA256
c696b1ba3409aa799769815a4bcc1da27e52e80b8fc2731d6e1713ff52be9160
-
SHA512
38a508d1100e91f4845b6933dfc432d4c8ef658da1d2bc817cc7dfb3e4e17c4386fb4685e8a3ffb4cc6a312853b81ee49be8c97e0758ab68aabd445f286dadea
-
SSDEEP
6144:Nd7rpL43btmQ58Z27zw39gY2FeZhrL8Jt:X7dL4AZ0U9gY2Fhz
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
resource yara_rule behavioral1/files/0x0036000000015659-40.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2544 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1832 zezij.exe 2592 hysiav.exe 1708 qewec.exe -
Loads dropped DLL 5 IoCs
pid Process 1948 1e805c0b8a34c6295ec6e7d02c0f0539.exe 1948 1e805c0b8a34c6295ec6e7d02c0f0539.exe 1832 zezij.exe 1832 zezij.exe 2592 hysiav.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe 1708 qewec.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1832 1948 1e805c0b8a34c6295ec6e7d02c0f0539.exe 28 PID 1948 wrote to memory of 1832 1948 1e805c0b8a34c6295ec6e7d02c0f0539.exe 28 PID 1948 wrote to memory of 1832 1948 1e805c0b8a34c6295ec6e7d02c0f0539.exe 28 PID 1948 wrote to memory of 1832 1948 1e805c0b8a34c6295ec6e7d02c0f0539.exe 28 PID 1948 wrote to memory of 2544 1948 1e805c0b8a34c6295ec6e7d02c0f0539.exe 29 PID 1948 wrote to memory of 2544 1948 1e805c0b8a34c6295ec6e7d02c0f0539.exe 29 PID 1948 wrote to memory of 2544 1948 1e805c0b8a34c6295ec6e7d02c0f0539.exe 29 PID 1948 wrote to memory of 2544 1948 1e805c0b8a34c6295ec6e7d02c0f0539.exe 29 PID 1832 wrote to memory of 2592 1832 zezij.exe 31 PID 1832 wrote to memory of 2592 1832 zezij.exe 31 PID 1832 wrote to memory of 2592 1832 zezij.exe 31 PID 1832 wrote to memory of 2592 1832 zezij.exe 31 PID 2592 wrote to memory of 1708 2592 hysiav.exe 34 PID 2592 wrote to memory of 1708 2592 hysiav.exe 34 PID 2592 wrote to memory of 1708 2592 hysiav.exe 34 PID 2592 wrote to memory of 1708 2592 hysiav.exe 34 PID 2592 wrote to memory of 2956 2592 hysiav.exe 35 PID 2592 wrote to memory of 2956 2592 hysiav.exe 35 PID 2592 wrote to memory of 2956 2592 hysiav.exe 35 PID 2592 wrote to memory of 2956 2592 hysiav.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e805c0b8a34c6295ec6e7d02c0f0539.exe"C:\Users\Admin\AppData\Local\Temp\1e805c0b8a34c6295ec6e7d02c0f0539.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\zezij.exe"C:\Users\Admin\AppData\Local\Temp\zezij.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\hysiav.exe"C:\Users\Admin\AppData\Local\Temp\hysiav.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\qewec.exe"C:\Users\Admin\AppData\Local\Temp\qewec.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:2956
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD57113dd443969d0a944936ebb823ba9d1
SHA132577bef0fbc66dd7ccb8d718a3c584887e1e583
SHA256d8661955ada07189fe9078c1367d9f64c0abfc4dad8c91d3fedc1016117a7ff3
SHA512acdbb05cc800970d5f830a62854d33f61c794389b9c4e6d506abbab9d3d245a216e3a5df6ec0496689a23291d3e65e0ac130c07a3ca3f65dfd16b27ef9467756
-
Filesize
276B
MD52b304a44c6cca72085cf0b05f7aa3795
SHA132000767f611829ec66aead42dccf9a2d601d972
SHA2564b74b0bed07c35ac6fbe5c275f96a8f06b81a1f32d93e2390ae1f1c2e7cf71e8
SHA51240aac327cbc311cd1a3d33c6fd6f6666a255a2eda96dcaeef406ee7a5bc6bdaef8cf870266c351484c2c7fa3c294c40bb11c28ba616458a2e4ee0c5432000d1b
-
Filesize
512B
MD57405eb2d433688448c29968972c6039d
SHA18f872058d5fd6b03193421575aed11ee4834c8a8
SHA256ae3b9a4480ce069e691c370c0cff44614e37cf1faf0f5ae19de54a19ee45bdb8
SHA5124bdbc043344451b01c5e1093d9ba19c6128a0ef68b4ecb4cd6fa6cce79b517d36afd9af3af68bd2f9c439ff53733b63c2e0b5ff21b7871d2abb6d0ae80e9cbc5
-
Filesize
136KB
MD5dc4572622027f01c03d8a532555c8c8d
SHA1a2476799f205c45e6646edffdf64c22d36abf45a
SHA256fb4267a5a8d477a25d683eee734c2c702725cf7b440a99940590102f38008096
SHA512d38dfacb156bb6ceabb7528730ed53191ddde6e9a7340ba21c4abf869db492e34ffd7ba52c55ec5d8857e70963640d78f75f41626cf974b01b39faccfc9e45a2
-
Filesize
342KB
MD5445f98d22d31ba45131774acb0762859
SHA190ece893df4aecbe6242d7702a5e3264e15843aa
SHA256f7ea67232a333441919e47b4c8bff5649d4fe8b0e72c3cecb96d226dde2a42b8
SHA5126cee6e74bfd836b26d9fcc8a0b9cf43fa1049f0e89c30f5039636a401e8eae75bf38c89a304fc167d67bf8b01b144e46b37fb65ab071b75e8dcaecd16fb95c34