Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe
Resource
win10v2004-20240426-en
General
-
Target
c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe
-
Size
3.4MB
-
MD5
59d92e50d47c999c9b3b3cb22a429701
-
SHA1
fb485deb392ef14d71004eb8ff3d02561a652259
-
SHA256
c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95
-
SHA512
68d1d4ee4669cb10340d318d81e8154d1338ad4360ad3de5506867a8dad28988316af3429ff266aba85149a1a228539206bd39d2a96b2b8b6998238e10535274
-
SSDEEP
49152:5zuB8YzBM3ktGeLHF8Pma3Yf9deo3TqLmKZK+HFHzO98XgaSclIAtmN7k/fCc3AR:5hYz7LHFCmaA9iCKjHFHVXgqya4Kl8J/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 2188 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2188 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 28 PID 1540 wrote to memory of 2188 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 28 PID 1540 wrote to memory of 2188 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 28 PID 1540 wrote to memory of 2188 1540 c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe"C:\Users\Admin\AppData\Local\Temp\c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe"C:\Users\Admin\AppData\Local\Temp\c1caf479a9f022dfb7be892fc9186031653ad946e445ca1a727e8b42b4d74f95.exe" RunSendSoftOnlineInfo2⤵
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36B
MD55a827b59f2db9c0bbd8291cc2a990074
SHA1db0cef5fc216f6130937aec826f2bc20f65f28c1
SHA2562b6fa068c455868a0bde1bf32813b733140a4efaa4f78cc7f77c86d4e0753fc7
SHA512d5fbd20814151a1cc8ef446cf717241d8fcb951f6ce53b18e4f224400f91ee2f575a0985b57728867b95a101c580bb43c339dfca03c91e90fb3cd52f0eeb093e
-
Filesize
34B
MD58e9624b64e11f14aa14cf2c6804fed15
SHA1f49d9610865501f8c4f282979a96905b95b09e2d
SHA256485c32595d61ee4da3eae295aa8e4d389ca6adc36e92bcab4f3fefe3266fd9c5
SHA512345dcd30fe3690d1d623ecd1c5392d5fb54e337a9062ca9076e7ef77d151922832be0fdc863a3b0c91133d3b75269948a6c9eb6c4d082d5a4be511b4b736c46e