Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
b4be4dd9b085ff32b35e9374254ba530N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4be4dd9b085ff32b35e9374254ba530N.exe
Resource
win10v2004-20240709-en
General
-
Target
b4be4dd9b085ff32b35e9374254ba530N.exe
-
Size
394KB
-
MD5
b4be4dd9b085ff32b35e9374254ba530
-
SHA1
22a4d1cdda00ab4ce9b67c04366eaef9be06d08f
-
SHA256
8868a7cc9adfec0c694a21b87cf43db6cbd5a8cc8a923b662d19b653a524124e
-
SHA512
301cc249310c06545bff12f5f0c60d0c051fde35834d9eb3c235b5f1374dfcb83e46fc74ee8ba02e22b78c281b90f61bed01107ebc39b65fa29eae19f810993c
-
SSDEEP
6144:38ASJKenie2xT2NU2OTFQb8Fb0I1UfFmPGL:3A5nilTFQbI0a+GGL
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent3 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\DB82BH~1.EXE" svchost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Avira svchost.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\AVAST Software\Avast svchost.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Eset\Nod svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2472 set thread context of 1956 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4be4dd9b085ff32b35e9374254ba530N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe 1956 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2472 wrote to memory of 1956 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 28 PID 2472 wrote to memory of 1956 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 28 PID 2472 wrote to memory of 1956 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 28 PID 2472 wrote to memory of 1956 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 28 PID 2472 wrote to memory of 1956 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 28 PID 2472 wrote to memory of 1956 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 28 PID 2472 wrote to memory of 1956 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 28 PID 2472 wrote to memory of 1956 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 28 PID 2472 wrote to memory of 1956 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 28 PID 2472 wrote to memory of 1956 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 28 PID 2472 wrote to memory of 1956 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 28 PID 2472 wrote to memory of 1956 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 28 PID 2472 wrote to memory of 812 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 29 PID 2472 wrote to memory of 812 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 29 PID 2472 wrote to memory of 812 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 29 PID 2472 wrote to memory of 812 2472 b4be4dd9b085ff32b35e9374254ba530N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4be4dd9b085ff32b35e9374254ba530N.exe"C:\Users\Admin\AppData\Local\Temp\b4be4dd9b085ff32b35e9374254ba530N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\db82bh6fbb.exe2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\hsy65A4.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\b4be4dd9b085ff32b35e9374254ba530N.exe""2⤵
- System Location Discovery: System Language Discovery
PID:812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28B
MD564830e2746aa57a6c29bfe9bfff9485d
SHA1b4b78d6ca43c1c9fc42596fa0804032e4c4d2d28
SHA2565285a55c2b15194a976b1f77c6f43e8be26a7611b50757d578ac78b78ebaa5e5
SHA512a02805c7602f0906f54a5c38d6e944a93a14bbe0a1731b5cb0f9f41c75bb340eaa3bf9b95f4b77bb617b50e3c6b08d5002f2cd63225bb4314b2ee4bc6759c312