Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 04:28
Behavioral task
behavioral1
Sample
5483d2b7bfb56cc323211240d1f5b6f0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5483d2b7bfb56cc323211240d1f5b6f0N.exe
Resource
win10v2004-20240730-en
General
-
Target
5483d2b7bfb56cc323211240d1f5b6f0N.exe
-
Size
41KB
-
MD5
5483d2b7bfb56cc323211240d1f5b6f0
-
SHA1
dd095aade07b9f9f404c7e0a2fb44ed0fd2d69e6
-
SHA256
4b1968404137cc0fb66138843d3a2861a9959d9be2f07496caef5ea043c0ad8c
-
SHA512
8ce5fc7f3fcf1c1ea30bfac55c6ca0f219e59a29591dfaf0e77f86ee36ad63232fe97863e63065af102a2c8cb74e7c77a0ec4d15b6cb1a59905e605a38409b10
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/K:AEwVs+0jNDY1qi/q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2404 services.exe -
resource yara_rule behavioral1/files/0x0008000000016d67-5.dat upx behavioral1/memory/2500-7-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2404-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2404-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2404-23-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2404-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2500-31-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2404-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0005000000004ed7-48.dat upx behavioral1/memory/2500-53-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2404-54-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2500-57-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2404-58-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2500-59-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2404-60-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2404-65-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2500-69-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2404-70-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2500-71-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2404-72-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2404-77-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 5483d2b7bfb56cc323211240d1f5b6f0N.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 5483d2b7bfb56cc323211240d1f5b6f0N.exe File opened for modification C:\Windows\java.exe 5483d2b7bfb56cc323211240d1f5b6f0N.exe File created C:\Windows\java.exe 5483d2b7bfb56cc323211240d1f5b6f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5483d2b7bfb56cc323211240d1f5b6f0N.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 5483d2b7bfb56cc323211240d1f5b6f0N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 5483d2b7bfb56cc323211240d1f5b6f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 5483d2b7bfb56cc323211240d1f5b6f0N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 5483d2b7bfb56cc323211240d1f5b6f0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2404 2500 5483d2b7bfb56cc323211240d1f5b6f0N.exe 30 PID 2500 wrote to memory of 2404 2500 5483d2b7bfb56cc323211240d1f5b6f0N.exe 30 PID 2500 wrote to memory of 2404 2500 5483d2b7bfb56cc323211240d1f5b6f0N.exe 30 PID 2500 wrote to memory of 2404 2500 5483d2b7bfb56cc323211240d1f5b6f0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5483d2b7bfb56cc323211240d1f5b6f0N.exe"C:\Users\Admin\AppData\Local\Temp\5483d2b7bfb56cc323211240d1f5b6f0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f0baf9704b0fe6250d88c49cc4d034a
SHA1c4117caeb46d90a39ee4b8bc9fe2fb77be477b9e
SHA2564b37331c6b286ea287ce286e0308c079907443c7a86d88dfab1a6b9052c669f6
SHA5129d5b956dbde0b19beb15e304817230ac35fcfb70758f88e57156af26b285271f8cda2d3d5e065a9778be338b23b0af92777ba0f43a529be3aaecc1037a39ba9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa3a5c1ecde6e8998f235a117355a581
SHA1d4ce5d4f59af2bf3f0d980045e3bd5114f1f9927
SHA25647e4e2a31af87b666ad14010f8e731a5fc5b55d9a9b33b4cc7a4d340281ce613
SHA512612db7f94d4beeb4a90a8cd277410c2cf0b689c5c8dc17ee44aa62db9516d39695ccf07a484db7d79f7cc03d6396f5b9720374533b05db0593dffe23bb82b310
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3H1FOMV1\search[1].htm
Filesize25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
41KB
MD5d13f4eef3f2741c0a748b9e0c3c28acd
SHA140802fdc739e9e304be0a598d51992e425fd2a86
SHA256e69477a7bd9605a510c398f7b661928df41cf826c5ca06c7e2a48029b361721d
SHA5123771fffa13658d9d623933459d27fee1b663712a328bd280e744e47f73711719658f433fe73ed9ffaafe06e2cfacd1df3ffad01ccf45864128759acce353c3a0
-
Filesize
192B
MD535bb81a8544ea388ca5e29339c27cc1d
SHA18a2e9685f97b4f0222a423c406499b291e5df3a5
SHA2561e7d68dfc480807ec655053e3dfcca870862d434e248c80638766fe9c695f22f
SHA51256c11cff2c54092fe656dac6685e51787593375f5802d446c09fbe9115a976aaf6f37c42df15de2091b6a127064823b899a9cd482044f2191a6693ae980c6c7f
-
Filesize
192B
MD54566c21180db4d04f0c9eac0e41d5c3b
SHA15a8bdaaab6bbe855d1253f29825eb586d60eedeb
SHA25633a6818b52bc9e3b41b92ea734a76ea17e44b49459e3ea3e7723b799f8c6c4f3
SHA512b651f0e88001093ea0ebde6a433cee5921570027458c7bd8c83af73fed78440560a1ee260077fecca4c37ce03b184a0b084697fbf2b3db8f7f128594bb911c11
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2