Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
QQ2006PY381.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
QQ2006PY381.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
安装说明.url
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
安装说明.url
Resource
win10v2004-20240709-en
General
-
Target
QQ2006PY381.exe
-
Size
19.4MB
-
MD5
0b188cc0f2bbe976851ffde4b7df46d7
-
SHA1
0eb0b2c683d107ae06350f54414e64f497636436
-
SHA256
cdffa4dba138b6c14e65cf1979df1381651beb873ec6cf02d05e4ec33b6961db
-
SHA512
a81acbd852a2e0fbb8363f44573a5cbf6d06f519a1e33d47cf9b0a6a25fb3f7f54617734c15ead5a4f9e20e54cc48ce5abab65995ebe14b0023cc909d8aa3909
-
SSDEEP
393216:04ZFGqeRMCT6qQrim1kh7dzP819jyLGF6hq3Lvf++aGGGjkNjusVCb1ia:04ZF1s05OhZzOHF6w3L2t3NjusVpa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3032 is-G9K82.tmp -
Loads dropped DLL 3 IoCs
pid Process 2392 QQ2006PY381.exe 3032 is-G9K82.tmp 3032 is-G9K82.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QQ2006PY381.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-G9K82.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3032 is-G9K82.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2392 wrote to memory of 3032 2392 QQ2006PY381.exe 30 PID 2392 wrote to memory of 3032 2392 QQ2006PY381.exe 30 PID 2392 wrote to memory of 3032 2392 QQ2006PY381.exe 30 PID 2392 wrote to memory of 3032 2392 QQ2006PY381.exe 30 PID 2392 wrote to memory of 3032 2392 QQ2006PY381.exe 30 PID 2392 wrote to memory of 3032 2392 QQ2006PY381.exe 30 PID 2392 wrote to memory of 3032 2392 QQ2006PY381.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\QQ2006PY381.exe"C:\Users\Admin\AppData\Local\Temp\QQ2006PY381.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\is-G2OTP.tmp\is-G9K82.tmp"C:\Users\Admin\AppData\Local\Temp\is-G2OTP.tmp\is-G9K82.tmp" /SL4 $400F8 "C:\Users\Admin\AppData\Local\Temp\QQ2006PY381.exe" 20020315 568322⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
640KB
MD5c9b98220dd90e04c12560c85bbd83315
SHA194c5d630c08c9f79dee673ed0909b19eae8e6974
SHA256a0915e449823d1e315e92b65f8b4ae94cc773ef3b718a77d7707b7e7ae2d3e28
SHA512af112b3230df5f45efd4b468d6f1b2df76911f02ed27bc96307bf9164926ac3f5c035ac8bcbe7352016006b4e2b92cad0e1a0213b6136377d654dbace960fd81
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3