Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
bd587f37e0e4fc41f407c0cca47a2692a581c66a891ac9e0176d3d30068d41bc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bd587f37e0e4fc41f407c0cca47a2692a581c66a891ac9e0176d3d30068d41bc.exe
Resource
win10v2004-20240412-en
General
-
Target
bd587f37e0e4fc41f407c0cca47a2692a581c66a891ac9e0176d3d30068d41bc.exe
-
Size
61KB
-
MD5
b5b38e9a5787ac15b657f3e2a6fb7197
-
SHA1
4d36cf06e5d6df07c02d6e3ea763b874abe88529
-
SHA256
bd587f37e0e4fc41f407c0cca47a2692a581c66a891ac9e0176d3d30068d41bc
-
SHA512
f7ffd26a336bc962cfc49ce20ea0007c9b13395942c5db783bc6c6b0eda85c602aa367b4ec3e670a4fe94f417ed8d14cd2ac63745ab7a2132999c05a4592e673
-
SSDEEP
1536:Httdse4OcUmWQIvEPZo6E5sEFd29NQgA2wHle5:vdse4OlQZo6EKEFdGM2Sle5
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2320 ewiuer2.exe 2700 ewiuer2.exe 2516 ewiuer2.exe 1572 ewiuer2.exe -
Loads dropped DLL 8 IoCs
pid Process 2180 bd587f37e0e4fc41f407c0cca47a2692a581c66a891ac9e0176d3d30068d41bc.exe 2180 bd587f37e0e4fc41f407c0cca47a2692a581c66a891ac9e0176d3d30068d41bc.exe 2320 ewiuer2.exe 2320 ewiuer2.exe 2700 ewiuer2.exe 2700 ewiuer2.exe 2516 ewiuer2.exe 2516 ewiuer2.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe File opened for modification C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe File opened for modification C:\Windows\SysWOW64\viesazm.mpk ewiuer2.exe File created C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2320 2180 bd587f37e0e4fc41f407c0cca47a2692a581c66a891ac9e0176d3d30068d41bc.exe 28 PID 2180 wrote to memory of 2320 2180 bd587f37e0e4fc41f407c0cca47a2692a581c66a891ac9e0176d3d30068d41bc.exe 28 PID 2180 wrote to memory of 2320 2180 bd587f37e0e4fc41f407c0cca47a2692a581c66a891ac9e0176d3d30068d41bc.exe 28 PID 2180 wrote to memory of 2320 2180 bd587f37e0e4fc41f407c0cca47a2692a581c66a891ac9e0176d3d30068d41bc.exe 28 PID 2320 wrote to memory of 2700 2320 ewiuer2.exe 30 PID 2320 wrote to memory of 2700 2320 ewiuer2.exe 30 PID 2320 wrote to memory of 2700 2320 ewiuer2.exe 30 PID 2320 wrote to memory of 2700 2320 ewiuer2.exe 30 PID 2700 wrote to memory of 2516 2700 ewiuer2.exe 31 PID 2700 wrote to memory of 2516 2700 ewiuer2.exe 31 PID 2700 wrote to memory of 2516 2700 ewiuer2.exe 31 PID 2700 wrote to memory of 2516 2700 ewiuer2.exe 31 PID 2516 wrote to memory of 1572 2516 ewiuer2.exe 35 PID 2516 wrote to memory of 1572 2516 ewiuer2.exe 35 PID 2516 wrote to memory of 1572 2516 ewiuer2.exe 35 PID 2516 wrote to memory of 1572 2516 ewiuer2.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd587f37e0e4fc41f407c0cca47a2692a581c66a891ac9e0176d3d30068d41bc.exe"C:\Users\Admin\AppData\Local\Temp\bd587f37e0e4fc41f407c0cca47a2692a581c66a891ac9e0176d3d30068d41bc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\System32\ewiuer2.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\System32\ewiuer2.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1572
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229B
MD5ccbb44a14aff30c3e9e29f29ef3e1613
SHA1f4f85d7891ef31f2839c9901dcb67483d4fdfb61
SHA256116e0b6271518d580def3a58da65c7c44dec4b40de04e589110f8ba5cd64a2e2
SHA512ca6eb12344459af1fc46184164f3261c91e3db6af531a8f4e580d25e962429785b5ac231f0458e03894253c540fc42f25cf9d8ffea3c4c9f05353b78bdcff799
-
Filesize
230B
MD5fa301e9d5036e412ef3329f173a26f46
SHA1c57a89fe9ec140d27c38bda3da2232c317408935
SHA256da28da04cc057d9cb30296ad1fa0be2c64e8e9822d120f69c9b735c292740032
SHA5126634ca60cfa95da400aaae8146a45af99adaa968995bcb0fc29b8111f607a368b6c316c18c427855a0dda5695ff846d05bb465d2e0f8b19c46f3e2b2355776da
-
Filesize
61KB
MD5767e16154fce87d63257ca681e9e1838
SHA108bcba5f65d2f02af8701184d54937474a750cd6
SHA256f6f1c7d2a66a0fabaa0681ea25e65c920cc9d9524cd6a93bc34e63ce3c3b47db
SHA5125dc0ea0963089942c510163816035a7752d9c2a95d8b65eb8ff97d44ee5d7db2483317c4219edaba0f4bd744881c14a00820751eb5954bbb818d92f0cd9f8681
-
Filesize
61KB
MD5b99e3166bfec8d2cb24385bee6893970
SHA1053b0a994c050b933a44cc040666bdbb08ac8533
SHA256da180401d557ecbaf6f556c5439ef129d16ad3789a98d98ff2a1649ef582e765
SHA512eac7cd9b2ab5825887937e37a532b733dd1cae565ce686c2055abe3e78fd24262e50361c854e80ab2ca04fa28e83a33a63ab149fd46e141779cb8b500dc6dbf5
-
Filesize
61KB
MD5a8fb7df119d924a1e326022e8563e852
SHA1dbb5a46b919d7c2680b334ece02ead19ab107109
SHA2566010ff87a319e92986106a7db1dfd704472dc64fa59cea55dee3f7cc1c9d1ba6
SHA512a8f399b6ef3025def4103dc24f140d5ba3c2b821d71ebbbc946216d8865ddc7a783cf2de534fcaa2d47d1ff2dcf1d6640000bfd51fe48b87bb447012bd771cf8
-
Filesize
61KB
MD5d637501bc70c188a211885b4eb377062
SHA161c8d1fd82fe9f525b2e5997520a252961786537
SHA256e34d5ad25fc40a7f957f027611ec867b0ec1399d2451b2f75dfadda3ba7f2111
SHA512a26e21decfcadb0f2e4cf6ce45ba5ab7a5c939018cdba36fcc2652f616cb41caa7b0642f036320210a2d84a390ec267dc537d128eade6895bb6323a8eedc5d52