Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 07:37
Behavioral task
behavioral1
Sample
a934df4f5b2760aec8fd9a830f04ca40N.exe
Resource
win7-20240704-en
General
-
Target
a934df4f5b2760aec8fd9a830f04ca40N.exe
-
Size
51KB
-
MD5
a934df4f5b2760aec8fd9a830f04ca40
-
SHA1
59cacd924ee694d146cf0bd62ea08e5109f5c1ec
-
SHA256
15368f5d2fdbd1324643ca21de570827aa27a9c730d27a74a5fe1dae29e90180
-
SHA512
2a39e38744eade51477c96fb16ec959b3185bd0d8655dbf150c188fc657bc3933b6f34c9169f374d2703f4e0f0bf4cb5f7540cdf36b0fc7742a4a665b2d3ccf6
-
SSDEEP
768:exwhM/tqZKgVuz1NmnbcuyD7Uf54Ak12M5ezNG/2rb7vqV7Nd:exkAGnVE1Nmnouy8B4ZUGezN/jqVRd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 840 wujek.exe -
Loads dropped DLL 2 IoCs
pid Process 3012 a934df4f5b2760aec8fd9a830f04ca40N.exe 3012 a934df4f5b2760aec8fd9a830f04ca40N.exe -
resource yara_rule behavioral1/memory/3012-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/files/0x000d0000000141f5-4.dat upx behavioral1/memory/3012-11-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/840-12-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/840-14-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a934df4f5b2760aec8fd9a830f04ca40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wujek.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 840 3012 a934df4f5b2760aec8fd9a830f04ca40N.exe 29 PID 3012 wrote to memory of 840 3012 a934df4f5b2760aec8fd9a830f04ca40N.exe 29 PID 3012 wrote to memory of 840 3012 a934df4f5b2760aec8fd9a830f04ca40N.exe 29 PID 3012 wrote to memory of 840 3012 a934df4f5b2760aec8fd9a830f04ca40N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a934df4f5b2760aec8fd9a830f04ca40N.exe"C:\Users\Admin\AppData\Local\Temp\a934df4f5b2760aec8fd9a830f04ca40N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\wujek.exe"C:\Users\Admin\AppData\Local\Temp\wujek.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5cf09764c83bc6f044aa34f9cdecd5372
SHA1714a7cc15996388e788ef07cf0b73972b97d09ef
SHA256e52f81d99e14b399a684d3b96e7f1a955e58f74c0b944af598ae900d13caa9c1
SHA512c674359fedb77fd514e5d1afb5dc891f2b5320afd43e1635abee4406484e232da928b21d67bbdef5cdde5324cbe8449780b041760d5a4b60fee2ce70c269d58b