Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/07/2024, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
31ba343115ad170d9e12a7f18aa9ef20N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
31ba343115ad170d9e12a7f18aa9ef20N.exe
Resource
win10v2004-20240709-en
General
-
Target
31ba343115ad170d9e12a7f18aa9ef20N.exe
-
Size
6.0MB
-
MD5
31ba343115ad170d9e12a7f18aa9ef20
-
SHA1
700aab1a6404c9e2f4322356b2e2fac595827ed6
-
SHA256
2757c40c3c771fbd296f5efb6d9a51d82e3504e4d5ab7810af1d3bef51d0f2e9
-
SHA512
1d2b5641d4b443803c2e00256f6e5cd44c0b2b12f86c4e0e9ad7c4a668f1d700743a0fe26993d785f4dbf5155aa610efee26544f391a197020dd5ab49df41ad7
-
SSDEEP
98304:emhd1UryeHtAvxUBV8BVmB5V7wQqZUha5jtSyZIUS:elntExUfmVA52QbaZtlir
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1972 C255.tmp -
Executes dropped EXE 1 IoCs
pid Process 1972 C255.tmp -
Loads dropped DLL 2 IoCs
pid Process 2988 31ba343115ad170d9e12a7f18aa9ef20N.exe 2988 31ba343115ad170d9e12a7f18aa9ef20N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31ba343115ad170d9e12a7f18aa9ef20N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1972 2988 31ba343115ad170d9e12a7f18aa9ef20N.exe 30 PID 2988 wrote to memory of 1972 2988 31ba343115ad170d9e12a7f18aa9ef20N.exe 30 PID 2988 wrote to memory of 1972 2988 31ba343115ad170d9e12a7f18aa9ef20N.exe 30 PID 2988 wrote to memory of 1972 2988 31ba343115ad170d9e12a7f18aa9ef20N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\31ba343115ad170d9e12a7f18aa9ef20N.exe"C:\Users\Admin\AppData\Local\Temp\31ba343115ad170d9e12a7f18aa9ef20N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\C255.tmp"C:\Users\Admin\AppData\Local\Temp\C255.tmp" --splashC:\Users\Admin\AppData\Local\Temp\31ba343115ad170d9e12a7f18aa9ef20N.exe 29C260639BCCC812E85DC77588BFB80CE3FCD32FE0A5E7E7A970FC7FDDCFF878C879B648A6A7A802093F5EDA7445DE680236B68DCF84FF5425BFE72598790D612⤵
- Deletes itself
- Executes dropped EXE
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD51734379b92815de8fdf101f2326ede77
SHA13b56119c5a820c92a7d1c12a68fd47d5356b77a9
SHA256b225a26b949af41300b26805624df16359f9f36cf41c1798ca2cc153ac161bdc
SHA5121b41e26c40c7bc5d9cab7705c91c365817a8772e1a266adcc27c55b3885a7b68b06e2a47c962ba0c35814c0b8b71e1852b22593f218206f9b729587d18d70ab7