Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
00096d48964848ea3f1efc058df51f60N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
00096d48964848ea3f1efc058df51f60N.exe
Resource
win10v2004-20240802-en
General
-
Target
00096d48964848ea3f1efc058df51f60N.exe
-
Size
38KB
-
MD5
00096d48964848ea3f1efc058df51f60
-
SHA1
271857ede50470bc12f98a40f8311e84bcc47898
-
SHA256
c3c60f1d19e5ee8d7838afb5121f9c7003ec1cd2d811611fd70c0e4430a28123
-
SHA512
fa2eac84acd3d1ee7dc43fcb60981037ca45e10634b9250fc8b7af4d97fc0a07bfff1c0999b35cad9c986e77f72266f1b7de2dbb0de1952b52140105f65a6029
-
SSDEEP
768:PfkbECqnOt0rfAReLkh/AEiv/nug8KqP0Ar:P8BsO2r2cgkG3VB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00096d48964848ea3f1efc058df51f60N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2688 00096d48964848ea3f1efc058df51f60N.exe -
Suspicious behavior: MapViewOfSection 24 IoCs
pid Process 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe 2688 00096d48964848ea3f1efc058df51f60N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2688 00096d48964848ea3f1efc058df51f60N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 380 2688 00096d48964848ea3f1efc058df51f60N.exe 3 PID 2688 wrote to memory of 380 2688 00096d48964848ea3f1efc058df51f60N.exe 3 PID 2688 wrote to memory of 380 2688 00096d48964848ea3f1efc058df51f60N.exe 3 PID 2688 wrote to memory of 380 2688 00096d48964848ea3f1efc058df51f60N.exe 3 PID 2688 wrote to memory of 380 2688 00096d48964848ea3f1efc058df51f60N.exe 3 PID 2688 wrote to memory of 380 2688 00096d48964848ea3f1efc058df51f60N.exe 3 PID 2688 wrote to memory of 380 2688 00096d48964848ea3f1efc058df51f60N.exe 3 PID 2688 wrote to memory of 388 2688 00096d48964848ea3f1efc058df51f60N.exe 4 PID 2688 wrote to memory of 388 2688 00096d48964848ea3f1efc058df51f60N.exe 4 PID 2688 wrote to memory of 388 2688 00096d48964848ea3f1efc058df51f60N.exe 4 PID 2688 wrote to memory of 388 2688 00096d48964848ea3f1efc058df51f60N.exe 4 PID 2688 wrote to memory of 388 2688 00096d48964848ea3f1efc058df51f60N.exe 4 PID 2688 wrote to memory of 388 2688 00096d48964848ea3f1efc058df51f60N.exe 4 PID 2688 wrote to memory of 388 2688 00096d48964848ea3f1efc058df51f60N.exe 4 PID 2688 wrote to memory of 428 2688 00096d48964848ea3f1efc058df51f60N.exe 5 PID 2688 wrote to memory of 428 2688 00096d48964848ea3f1efc058df51f60N.exe 5 PID 2688 wrote to memory of 428 2688 00096d48964848ea3f1efc058df51f60N.exe 5 PID 2688 wrote to memory of 428 2688 00096d48964848ea3f1efc058df51f60N.exe 5 PID 2688 wrote to memory of 428 2688 00096d48964848ea3f1efc058df51f60N.exe 5 PID 2688 wrote to memory of 428 2688 00096d48964848ea3f1efc058df51f60N.exe 5 PID 2688 wrote to memory of 428 2688 00096d48964848ea3f1efc058df51f60N.exe 5 PID 2688 wrote to memory of 472 2688 00096d48964848ea3f1efc058df51f60N.exe 6 PID 2688 wrote to memory of 472 2688 00096d48964848ea3f1efc058df51f60N.exe 6 PID 2688 wrote to memory of 472 2688 00096d48964848ea3f1efc058df51f60N.exe 6 PID 2688 wrote to memory of 472 2688 00096d48964848ea3f1efc058df51f60N.exe 6 PID 2688 wrote to memory of 472 2688 00096d48964848ea3f1efc058df51f60N.exe 6 PID 2688 wrote to memory of 472 2688 00096d48964848ea3f1efc058df51f60N.exe 6 PID 2688 wrote to memory of 472 2688 00096d48964848ea3f1efc058df51f60N.exe 6 PID 2688 wrote to memory of 488 2688 00096d48964848ea3f1efc058df51f60N.exe 7 PID 2688 wrote to memory of 488 2688 00096d48964848ea3f1efc058df51f60N.exe 7 PID 2688 wrote to memory of 488 2688 00096d48964848ea3f1efc058df51f60N.exe 7 PID 2688 wrote to memory of 488 2688 00096d48964848ea3f1efc058df51f60N.exe 7 PID 2688 wrote to memory of 488 2688 00096d48964848ea3f1efc058df51f60N.exe 7 PID 2688 wrote to memory of 488 2688 00096d48964848ea3f1efc058df51f60N.exe 7 PID 2688 wrote to memory of 488 2688 00096d48964848ea3f1efc058df51f60N.exe 7 PID 2688 wrote to memory of 496 2688 00096d48964848ea3f1efc058df51f60N.exe 8 PID 2688 wrote to memory of 496 2688 00096d48964848ea3f1efc058df51f60N.exe 8 PID 2688 wrote to memory of 496 2688 00096d48964848ea3f1efc058df51f60N.exe 8 PID 2688 wrote to memory of 496 2688 00096d48964848ea3f1efc058df51f60N.exe 8 PID 2688 wrote to memory of 496 2688 00096d48964848ea3f1efc058df51f60N.exe 8 PID 2688 wrote to memory of 496 2688 00096d48964848ea3f1efc058df51f60N.exe 8 PID 2688 wrote to memory of 496 2688 00096d48964848ea3f1efc058df51f60N.exe 8 PID 2688 wrote to memory of 604 2688 00096d48964848ea3f1efc058df51f60N.exe 9 PID 2688 wrote to memory of 604 2688 00096d48964848ea3f1efc058df51f60N.exe 9 PID 2688 wrote to memory of 604 2688 00096d48964848ea3f1efc058df51f60N.exe 9 PID 2688 wrote to memory of 604 2688 00096d48964848ea3f1efc058df51f60N.exe 9 PID 2688 wrote to memory of 604 2688 00096d48964848ea3f1efc058df51f60N.exe 9 PID 2688 wrote to memory of 604 2688 00096d48964848ea3f1efc058df51f60N.exe 9 PID 2688 wrote to memory of 604 2688 00096d48964848ea3f1efc058df51f60N.exe 9 PID 2688 wrote to memory of 680 2688 00096d48964848ea3f1efc058df51f60N.exe 10 PID 2688 wrote to memory of 680 2688 00096d48964848ea3f1efc058df51f60N.exe 10 PID 2688 wrote to memory of 680 2688 00096d48964848ea3f1efc058df51f60N.exe 10 PID 2688 wrote to memory of 680 2688 00096d48964848ea3f1efc058df51f60N.exe 10 PID 2688 wrote to memory of 680 2688 00096d48964848ea3f1efc058df51f60N.exe 10 PID 2688 wrote to memory of 680 2688 00096d48964848ea3f1efc058df51f60N.exe 10 PID 2688 wrote to memory of 680 2688 00096d48964848ea3f1efc058df51f60N.exe 10 PID 2688 wrote to memory of 752 2688 00096d48964848ea3f1efc058df51f60N.exe 11 PID 2688 wrote to memory of 752 2688 00096d48964848ea3f1efc058df51f60N.exe 11 PID 2688 wrote to memory of 752 2688 00096d48964848ea3f1efc058df51f60N.exe 11 PID 2688 wrote to memory of 752 2688 00096d48964848ea3f1efc058df51f60N.exe 11 PID 2688 wrote to memory of 752 2688 00096d48964848ea3f1efc058df51f60N.exe 11 PID 2688 wrote to memory of 752 2688 00096d48964848ea3f1efc058df51f60N.exe 11 PID 2688 wrote to memory of 752 2688 00096d48964848ea3f1efc058df51f60N.exe 11 PID 2688 wrote to memory of 816 2688 00096d48964848ea3f1efc058df51f60N.exe 12
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:380
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:604
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:760
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1028
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:680
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:752
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:816
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1148
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:848
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:972
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:268
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:492
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1072
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1140
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:316
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:1792
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:1800
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:488
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:496
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:388
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "847776419541472831421572157-1786627542-2548352591954953698853165987320825730"2⤵PID:2676
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:428
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\00096d48964848ea3f1efc058df51f60N.exe"C:\Users\Admin\AppData\Local\Temp\00096d48964848ea3f1efc058df51f60N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688
-