Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/07/2024, 00:24
Static task
static1
Behavioral task
behavioral1
Sample
7c7bdc83504ba280e6115d71099c718938a54f6f9191bb49973046a17d0d1abc.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7c7bdc83504ba280e6115d71099c718938a54f6f9191bb49973046a17d0d1abc.exe
Resource
win10v2004-20240709-en
General
-
Target
7c7bdc83504ba280e6115d71099c718938a54f6f9191bb49973046a17d0d1abc.exe
-
Size
539KB
-
MD5
bd9c5ff75ab9b7c8159adda10a47ceaa
-
SHA1
c92f9643058d4e2eb43170e48c378d9ec18649c2
-
SHA256
7c7bdc83504ba280e6115d71099c718938a54f6f9191bb49973046a17d0d1abc
-
SHA512
32ff27b02732e0c7b1ca55d6442b1982f9b023dadc7b4ac677931aca7760ce901a16e3b2a17d98d631cef442b74e3161b8596b7b9130862b351a82f5820cfc53
-
SSDEEP
12288:NYIW0p98Oh8P7h8R8FeVN2/+/rIUz/Y26hZmUWT:ZW298E8uR8Edg26jmVT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1716 B7F9.tmp -
Loads dropped DLL 1 IoCs
pid Process 2780 7c7bdc83504ba280e6115d71099c718938a54f6f9191bb49973046a17d0d1abc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B7F9.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c7bdc83504ba280e6115d71099c718938a54f6f9191bb49973046a17d0d1abc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1716 B7F9.tmp -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2824 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1716 B7F9.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 WINWORD.EXE 2824 WINWORD.EXE 2824 WINWORD.EXE 2824 WINWORD.EXE 2824 WINWORD.EXE 2824 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2780 wrote to memory of 1716 2780 7c7bdc83504ba280e6115d71099c718938a54f6f9191bb49973046a17d0d1abc.exe 30 PID 2780 wrote to memory of 1716 2780 7c7bdc83504ba280e6115d71099c718938a54f6f9191bb49973046a17d0d1abc.exe 30 PID 2780 wrote to memory of 1716 2780 7c7bdc83504ba280e6115d71099c718938a54f6f9191bb49973046a17d0d1abc.exe 30 PID 2780 wrote to memory of 1716 2780 7c7bdc83504ba280e6115d71099c718938a54f6f9191bb49973046a17d0d1abc.exe 30 PID 1716 wrote to memory of 2824 1716 B7F9.tmp 31 PID 1716 wrote to memory of 2824 1716 B7F9.tmp 31 PID 1716 wrote to memory of 2824 1716 B7F9.tmp 31 PID 1716 wrote to memory of 2824 1716 B7F9.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c7bdc83504ba280e6115d71099c718938a54f6f9191bb49973046a17d0d1abc.exe"C:\Users\Admin\AppData\Local\Temp\7c7bdc83504ba280e6115d71099c718938a54f6f9191bb49973046a17d0d1abc.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\B7F9.tmp"C:\Users\Admin\AppData\Local\Temp\B7F9.tmp" --pingC:\Users\Admin\AppData\Local\Temp\7c7bdc83504ba280e6115d71099c718938a54f6f9191bb49973046a17d0d1abc.exe FA758A8423CBBD49EB8B39711204F06B810959BD9608241CCA78D458CDC1D67EEB6302C473ED87F5BF72CD9D25FC2685261234902D750A3E63BDE174C3A762702⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7c7bdc83504ba280e6115d71099c718938a54f6f9191bb49973046a17d0d1abc.docx"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7c7bdc83504ba280e6115d71099c718938a54f6f9191bb49973046a17d0d1abc.docx
Filesize21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
539KB
MD5acc5b4ce6991463d32bee1dee7c36170
SHA175b354370eff14f0cf5310f527934f7fd8e1e383
SHA25698465dc539e87f6559f50cfaccb176b31fbe3c3e1a4120629638fd0e8d88c551
SHA5123c8d02ad224fd6d3991efc034bee952111b84cbe4cc6c76329b24c4c2f892fed2e0e886aebbca87d525b2ed60b61926070ec7c53d835521657fe208d7672638a