Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
a8cff6a2ac7e048fbba9d91e346e7de0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a8cff6a2ac7e048fbba9d91e346e7de0N.exe
Resource
win10v2004-20240802-en
General
-
Target
a8cff6a2ac7e048fbba9d91e346e7de0N.exe
-
Size
60KB
-
MD5
a8cff6a2ac7e048fbba9d91e346e7de0
-
SHA1
abff4df76938c8afbe03b1332085eaf5741e8501
-
SHA256
70e12f8792861dda4fc5ed60935bd16d939da259811f5eee2cbcb0503f94d7bb
-
SHA512
6b37f5a14a0cc0e3b1a5467922c79e4239b67b95d9f71e8ab37eb3b04cf2646117971d28f97151c608386e3c0db12a0d18f2e20de9c543cdcfbfc7d4f1790bb3
-
SSDEEP
384:asjPGY2HXgrkEYYhQ98E8I1XAV/QcaYpATUgch1A9NB/erxlF8fmuMhf+W:aePG5H8XhKD8ISZQjkgs1lxlFemx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2424 winupdate.exe -
Loads dropped DLL 1 IoCs
pid Process 2260 a8cff6a2ac7e048fbba9d91e346e7de0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8cff6a2ac7e048fbba9d91e346e7de0N.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 winupdate.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 winupdate.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2424 2260 a8cff6a2ac7e048fbba9d91e346e7de0N.exe 28 PID 2260 wrote to memory of 2424 2260 a8cff6a2ac7e048fbba9d91e346e7de0N.exe 28 PID 2260 wrote to memory of 2424 2260 a8cff6a2ac7e048fbba9d91e346e7de0N.exe 28 PID 2260 wrote to memory of 2424 2260 a8cff6a2ac7e048fbba9d91e346e7de0N.exe 28 PID 2260 wrote to memory of 2424 2260 a8cff6a2ac7e048fbba9d91e346e7de0N.exe 28 PID 2260 wrote to memory of 2424 2260 a8cff6a2ac7e048fbba9d91e346e7de0N.exe 28 PID 2260 wrote to memory of 2424 2260 a8cff6a2ac7e048fbba9d91e346e7de0N.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8cff6a2ac7e048fbba9d91e346e7de0N.exe"C:\Users\Admin\AppData\Local\Temp\a8cff6a2ac7e048fbba9d91e346e7de0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\winupdate.exe"C:\Users\Admin\AppData\Local\Temp\winupdate.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD571bdc7ac288ef7da948f3bf99e6a7db4
SHA139f829caece755e48e9e23240dc9729d8a108394
SHA256c37398d4e9ff3b49a044ad12d735686c63fcfb4b03282b5899d23cb3f2871d7f
SHA5128f9e9b0568a3357d75504fe27ab97ddf5ac87ce65491600dba7c1b0fbeeca30279864887d0a9146a12300c1502ee61ad4625e16547fe237db99520a09d388652