Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
90b49e114f8364e17c05a99e1e685fc8521c8d7b86cc43c53104e5929c0ebabe.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
90b49e114f8364e17c05a99e1e685fc8521c8d7b86cc43c53104e5929c0ebabe.exe
Resource
win10v2004-20240802-en
General
-
Target
90b49e114f8364e17c05a99e1e685fc8521c8d7b86cc43c53104e5929c0ebabe.exe
-
Size
942KB
-
MD5
fbefbe19cb44c0065581dbbfb059d309
-
SHA1
467f3f03c4e9065f84645da3942647232c7f382b
-
SHA256
90b49e114f8364e17c05a99e1e685fc8521c8d7b86cc43c53104e5929c0ebabe
-
SHA512
8d20340c5668e3a9e239cf00fc51e811fff621ea90e83820b21e146316a60dfdde9e0e3627069bd3a19927665f33114ffbc4825b456c7e8a918b3165e15713ef
-
SSDEEP
24576:kqDEvCTbMWu7rQYlBQcBiT6rprG8amywD:kTvC/MTQYxsWR7amy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90b49e114f8364e17c05a99e1e685fc8521c8d7b86cc43c53104e5929c0ebabe.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2516 90b49e114f8364e17c05a99e1e685fc8521c8d7b86cc43c53104e5929c0ebabe.exe 2516 90b49e114f8364e17c05a99e1e685fc8521c8d7b86cc43c53104e5929c0ebabe.exe 2516 90b49e114f8364e17c05a99e1e685fc8521c8d7b86cc43c53104e5929c0ebabe.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2516 90b49e114f8364e17c05a99e1e685fc8521c8d7b86cc43c53104e5929c0ebabe.exe 2516 90b49e114f8364e17c05a99e1e685fc8521c8d7b86cc43c53104e5929c0ebabe.exe 2516 90b49e114f8364e17c05a99e1e685fc8521c8d7b86cc43c53104e5929c0ebabe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\90b49e114f8364e17c05a99e1e685fc8521c8d7b86cc43c53104e5929c0ebabe.exe"C:\Users\Admin\AppData\Local\Temp\90b49e114f8364e17c05a99e1e685fc8521c8d7b86cc43c53104e5929c0ebabe.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504B
MD545d1598694601dad7729f52fa447b061
SHA155f8d317fa774fcf23e3537361a1887ff85229f7
SHA256dda94ae213485238da785509dd1e87717513c0c78af3b4ece4a9e3952221ad3c
SHA512246bc6f62379cd9bf7761d18b41695ddc1487b7b18050547906fa47de7470baa89645e61f32f93882af11eb0caed1f67cf3960bf14b4a71708091ff41886f6b2