Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
37e440169a8f25d185e0547245390910N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
37e440169a8f25d185e0547245390910N.exe
Resource
win10v2004-20240709-en
General
-
Target
37e440169a8f25d185e0547245390910N.exe
-
Size
82KB
-
MD5
37e440169a8f25d185e0547245390910
-
SHA1
6ba3e7574cdfc8a7e463a8f6f8ba418edbd68795
-
SHA256
ad21956bf5a65d88ac21e74d90c1ad119d81f732d1b2e8db30180b149531d419
-
SHA512
25b41a92aa02f3ea2416549a17defa1eea2c7a17a0cb8af71e28c8686fbffef69e8d6e58f38024f5b0ccc55439bd313d3624a10803fa24b9440f8e216219608f
-
SSDEEP
768:ChZr2QJL5hMroyCqk6UHLe5XpEs9DLc30spTQcS0NQ:sZdJL5KrMzpH65GcEpZQcSE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1496 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1620 kbjhost.exe -
resource yara_rule behavioral1/memory/1792-1-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/1792-4-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/1620-12-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/1620-18-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/1620-19-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/1620-22-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/1620-30-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\AppPatch\IME\kbjhost.exe 37e440169a8f25d185e0547245390910N.exe File created C:\Windows\AppPatch\IME\kbjhost.exe 37e440169a8f25d185e0547245390910N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37e440169a8f25d185e0547245390910N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kbjhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1792 37e440169a8f25d185e0547245390910N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1496 1792 37e440169a8f25d185e0547245390910N.exe 31 PID 1792 wrote to memory of 1496 1792 37e440169a8f25d185e0547245390910N.exe 31 PID 1792 wrote to memory of 1496 1792 37e440169a8f25d185e0547245390910N.exe 31 PID 1792 wrote to memory of 1496 1792 37e440169a8f25d185e0547245390910N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\37e440169a8f25d185e0547245390910N.exe"C:\Users\Admin\AppData\Local\Temp\37e440169a8f25d185e0547245390910N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\37E440~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1496
-
-
C:\Windows\AppPatch\IME\kbjhost.exeC:\Windows\AppPatch\IME\kbjhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5c6db2379392ecefec36c546ae3ca6fee
SHA134be5fe7cd88bfc15702e086b30198f8c5290aa6
SHA256fb9ede31e6fc9ee22c3702b240eb89a1773427c6a9785ac62f816c488c1c755c
SHA512760f25df75e5c4c451cd419131a04413f175c27eb0789aa0fee73482394a00f1ea60adbe183c7b3dcc6ab7f4f32952d2194da2b5cf0ae035677425ff2f4f32cc